18 research outputs found

    Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers

    Get PDF
    Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is the most used wireless transmission scheme in the world. However, its security is the interesting problem to discuss if we want to use this scheme to transmit a sensitive data, such as in the military and commercial communication systems. In this paper, we propose a new method to increase the security of MIMO-OFDM system using the change of location of fake subcarrier. The fake subcarriers’ location is generated per packet of data using Pseudo Random sequence generator. The simulation results show that the proposed scheme does not decrease the performance of conventional MIMO-OFDM. The attacker or eavesdropper gets worse Bit Error Rate (BER) than the legal receiver compared to the conventional MIMO-OFDM system

    Design of an OFDM Physical Layer Encryption Scheme

    Get PDF
    This paper presents a new encryption scheme implemented at the physical layer of wireless networks employing orthogonal frequency-division multiplexing (OFDM). The new scheme obfuscates the subcarriers by randomly reserving several subcarriers for dummy data and resequences the training symbol by a new secure sequence. Subcarrier obfuscation renders the OFDM transmission more secure and random, whereas training symbol resequencing protects the entire physical layer packet but does not affect the normal functions of synchronization and channel estimation of legitimate users while preventing eavesdroppers from performing these functions. The security analysis shows that the system is robust to various attacks by analyzing the search space using an exhaustive key search. Our scheme is shown to perform better in terms of search space, key rate, and complexity in comparison with other OFDM physical layer encryption schemes. The scheme offers options for users to customize the security level and the key rate according to the hardware resource. Its low complexity nature also makes the scheme suitable for resource-limited devices. Details of practical design considerations are highlighted by applying the approach to an IEEE 802.11 OFDM system case study

    Physical-Layer Security Enhancement in Wireless Communication Systems

    Get PDF
    Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of our lives. Despite of their popularities, wireless communications are vulnerable to various attacks due to the open nature of radio propagation. In fact, communication security in wireless networks is becoming more critical than ever. As a solution, conventional cryptographic techniques are deployed on upper layers of network protocols. Along with direct attacks from lower layer, wireless security challenges come with the rapid evolution of sophisticated decipher techniques. Conventional security mechanisms are not necessarily effective against potential attacks from the open wireless environment anymore. As an alternative, physical-layer(PHY) security, utilizing unique features from lower layer, becomes a new research focus for many wireless communication systems. In this thesis, three mechanisms for PHY security enhancement are investigated. Beginning with a discussion on the security vulnerability in highly standardized infrastructures, the thesis proposed a time domain scrambling scheme of orthogonal frequency division multiplexing (OFDM) system to improve the PHY security. The method relies on secretly scrambling each OFDM symbol in time domain, resulting in constellation transformation in frequency domain, to hide transmission features. As a complement to existing secrecy capacity maximization based optimal cooperative jamming systems, a security strategy based on the compromised secrecy region (CSR) minimization in cooperative jamming is then proposed when instantaneous channel state information(CSI) is not available. The optimal parameters of the jammer are derived to minimize the CSR which exhibits high secrecy outage probability. At last, security enhancement of OFDM system in cooperative networks is also investigated. The function selection strategies of cooperative nodes are studied. Our approach is capable of enhancing the security of broadband communications by selecting the proper function of each cooperative node. Numerical results demonstrate the feasibility of three proposed physical layer security mechanisms by examining the communication reliability, achievable CSR and secrecy capacity respectively

    Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Get PDF
    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered

    Secure OFDM System Design for Wireless Communications

    Get PDF
    Wireless communications is widely employed in modern society and plays an increasingly important role in people\u27s daily life. The broadcast nature of radio propagation, however, causes wireless communications particularly vulnerable to malicious attacks, and leads to critical challenges in securing the wireless transmission. Motivated by the insufficiency of traditional approaches to secure wireless communications, physical layer security that is emerging as a complement to the traditional upper-layer security mechanisms is investigated in this dissertation. Five novel techniques toward the physical layer security of wireless communications are proposed. The first two techniques focus on the security risk assessment in wireless networks to enable a situation-awareness based transmission protection. The third and fourth techniques utilize wireless medium characteristics to enhance the built-in security of wireless communication systems, so as to prevent passive eavesdropping. The last technique provides an embedded confidential signaling link for secure transmitter-receiver interaction in OFDM systems

    Orthogonal Time Frequency Space (OTFS) Modulation for Wireless Communications

    Full text link
    The orthogonal time frequency space (OTFS) modulation is a recently proposed multi-carrier transmission scheme, which innovatively multiplexes the information symbols in the delay-Doppler (DD) domain instead of the conventional time-frequency (TF) domain. The DD domain symbol multiplexing gives rise to a direct interaction between the DD domain information symbols and DD domain channel responses, which are usually quasi-static, compact, separable, and potentially sparse. Therefore, OTFS modulation enjoys appealing advantages over the conventional orthogonal frequency-division multiplexing (OFDM) modulation for wireless communications. In this thesis, we investigate the related subjects of OTFS modulation for wireless communications, specifically focusing on its signal detection, performance analysis, and applications. In specific, we first offer a literature review on the OTFS modulation in Chapter~1. Furthermore, a summary of wireless channels is given in Chapter 2. In particular, we discuss the characteristics of wireless channels in different domains and compare their properties. In Chapter 3, we present a detailed derivation of the OTFS concept based on the theory of Zak transform (ZT) and discrete Zak transform (DZT). We unveil the connections between OTFS modulation and DZT, where the DD domain interpretations of key components for modulation, such as pulse shaping, and matched-filtering, are highlighted. The main research contributions of this thesis appear in Chapter 4 to Chapter 7. In Chapter 4, we introduce the hybrid maximum a posteriori (MAP) and parallel interference cancellation (PIC) detection. This detection approach exploits the power discrepancy among different resolvable paths and can obtain near-optimal error performance with a reduced complexity. In Chapter 5, we propose the cross domain iterative detection for OTFS modulation by leveraging the unitary transformations among different domains. After presenting the key concepts of the cross domain iterative detection, we study its performance via state evolution. We show that the cross domain iterative detection can approach the optimal error performance theoretically. Our numerical results agree with our theoretical analysis and demonstrate a significant performance improvement compared to conventional OTFS detection methods. In Chapter 6, we investigate the error performance for coded OTFS systems based on the pairwise-error probability (PEP) analysis. We show that there exists a fundamental trade-off between the coding gain and the diversity gain for coded OTFS systems. According to this trade-off, we further provide some rule-of-thumb guidelines for code design in OTFS systems. In Chapter 7, we study the potential of OTFS modulation in integrated sensing and communication (ISAC) transmissions. We propose the concept of spatial-spreading to facilitate the ISAC design, which is able to discretize the angular domain, resulting in simple and insightful input-output relationships for both radar sensing and communication. Based on spatial-spreading, we verify the effectiveness of OTFS modulation in ISAC transmissions and demonstrate the performance improvements in comparison to the OFDM counterpart. A summary of this thesis is presented in Chapter 8, where we also discuss some potential research directions on OTFS modulation. The concept of OTFS modulation and the elegant theory of DD domain communication may have opened a new gate for the development of wireless communications, which is worthy to be further explored

    Méthodes de codage et d'estimation adaptative appliquées aux communications sans fil

    Get PDF
    Les recherches et les contributions présentées portent sur des techniques de traitement du signal appliquées aux communications sans fil. Elles s’articulent autour des points suivants : (1) l’estimation adaptative de canaux de communication dans différents contextes applicatifs, (2) la correction de bruit impulsionnel et la réduction du niveau de PAPR (Peak to Average Power Ratio) dans un système multi-porteuse, (3) l’optimisation de schémas de transmission pour la diffusion sur des canaux gaussiens avec/sans contrainte de sécurité, (4) l’analyse, l’interprétation et l’amélioration des algorithmes de décodage itératif par le biais de l’optimisation, de la théorie des jeux et des outils statistiques. L’accent est plus particulièrement mis sur le dernier thème

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    Cooperative Radio Communications for Green Smart Environments

    Get PDF
    The demand for mobile connectivity is continuously increasing, and by 2020 Mobile and Wireless Communications will serve not only very dense populations of mobile phones and nomadic computers, but also the expected multiplicity of devices and sensors located in machines, vehicles, health systems and city infrastructures. Future Mobile Networks are then faced with many new scenarios and use cases, which will load the networks with different data traffic patterns, in new or shared spectrum bands, creating new specific requirements. This book addresses both the techniques to model, analyse and optimise the radio links and transmission systems in such scenarios, together with the most advanced radio access, resource management and mobile networking technologies. This text summarises the work performed by more than 500 researchers from more than 120 institutions in Europe, America and Asia, from both academia and industries, within the framework of the COST IC1004 Action on "Cooperative Radio Communications for Green and Smart Environments". The book will have appeal to graduates and researchers in the Radio Communications area, and also to engineers working in the Wireless industry. Topics discussed in this book include: • Radio waves propagation phenomena in diverse urban, indoor, vehicular and body environments• Measurements, characterization, and modelling of radio channels beyond 4G networks• Key issues in Vehicle (V2X) communication• Wireless Body Area Networks, including specific Radio Channel Models for WBANs• Energy efficiency and resource management enhancements in Radio Access Networks• Definitions and models for the virtualised and cloud RAN architectures• Advances on feasible indoor localization and tracking techniques• Recent findings and innovations in antenna systems for communications• Physical Layer Network Coding for next generation wireless systems• Methods and techniques for MIMO Over the Air (OTA) testin
    corecore