Physical Layer Security in the Presence of Interference
Authors:
Dimitrios S. Karas,
Alexandros-Apostolos A. Boulogeorgos,
George K. Karagiannidis
Abstract:
We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer (PHY) security of a system consisted of a base-station (BS), a legitimate user, and an eavesdropper. To this end, we present a novel closed-form expression for the secrecy outage probability, which takes into account the fading characteristics of the wireless environment, the location and the number…
▽ More
We evaluate and quantify the joint effect of fading and multiple interferers on the physical-layer (PHY) security of a system consisted of a base-station (BS), a legitimate user, and an eavesdropper. To this end, we present a novel closed-form expression for the secrecy outage probability, which takes into account the fading characteristics of the wireless environment, the location and the number of interferers, as well as the transmission power of the BS and the interference. The results reveal that the impact of interference should be seriously taken into account in the design and deployment of a wireless system with PHY security.
△ Less
Submitted 24 March, 2018;
originally announced March 2018.
Securing the MIMO Wiretap Channel with Polar Codes and Encryption
Authors:
Dimitrios S. Karas,
Alexandros-Apostolos A. Boulogeorgos,
Sotirios K. Mihos,
Vasileios M. Kapinas,
George K. Karagiannidis
Abstract:
Polar codes have been proven to be capacity achieving for any binary-input discrete memoryless channel, while at the same time they can reassure secure and reliable transmission over the single-input single-output wireless channel. However, the use of polar codes to secure multiple-antenna transmission and reception has not yet been reported in the open literature. In this paper, we assume a multi…
▽ More
Polar codes have been proven to be capacity achieving for any binary-input discrete memoryless channel, while at the same time they can reassure secure and reliable transmission over the single-input single-output wireless channel. However, the use of polar codes to secure multiple-antenna transmission and reception has not yet been reported in the open literature. In this paper, we assume a multiple-input multiple-output wiretap channel, where the legitimate receiver and the eavesdropper are equipped with the same number of antennas. We introduce a protocol that exploits the properties of both physical and media access control layer security by employing polar coding and encryption techniques in a hybrid manner in order to guarantee secure transmission. A novel security technique is also proposed, where a cryptographic key is generated based on the information transmitted and renewed every transmission block without the need for a separate key exchange method. Finally, to illustrate the effectiveness of the proposed protocol, we prove the weak and strong security conditions, and we provide a practical method to achieve computational security for the cases where these conditions cannot be established.
△ Less
Submitted 27 March, 2016; v1 submitted 22 October, 2015;
originally announced October 2015.