Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks
@article{Zegrar2022FlexiblePL, title={Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks}, author={Salah Eddine Zegrar and Haji Muhammad Furqan and H{\"u}seyin Arslan}, journal={IEEE Transactions on Communications}, year={2022}, volume={70}, pages={2635-2647} }
In this work, novel physical layer security (PLS) schemes are proposed for orthogonal frequency-division multiplexing (OFDM) to secure both data and pilots in multiple-input multiple-output (MIMO) systems. The majority of previous studies focus on only securing the data without considering the security of the pilots used for channel estimation. However, the leakage of channel state information (CSI) from a legitimate node to an eavesdropper allows the latter to acquire knowledge about the…
Figures and Tables from this paper
References
SHOWING 1-10 OF 32 REFERENCES
Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2019
A conceptual, generic, and expandable framework for classifying the existing PLS techniques against wireless passive eavesdropping is proposed, and the security techniques that are reviewed are divided into two primary approaches: signal-to-interference-plus-noise ratio- based approach and complexity-based approach.
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2014
A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services
- Computer ScienceIEEE Access
- 2017
The proposed scheme provides secrecy even in the worst security scenario, where the eavesdropper can know the channel of the legitimate link when an explicit channel feedback is used as is the case in frequency division duplexing systems, while maintaining low complexity and high reliability at the legitimate user.
Achieving secure communication through pilot manipulation
- Computer Science2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
- 2015
Two novel algorithms are introduced, which manipulate pilot tones according to legitimate channels' phase and amplitude characteristics, which decrease the channel estimation quality of the eavesdropper considerably and reduce eavesdroppers' ability to estimate the wireless channel.
Enhancing physical layer security of OFDM systems using channel shortening
- Computer Science, Business2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
- 2017
The presented technique can provide a significant BER performance gap between Bob and Eve, and can provide Quality of Service (QoS) based security, and the design is shown to be robust against channel imperfections and to provide spectral and power efficiency beside enhancing security.
Link-Signature-Based Discriminatory Channel Estimation (LS-DCE) for Physical Layer Security in Stationary and Mobile OFDM Transceivers
- Computer ScienceIEEE Transactions on Vehicular Technology
- 2020
This work proposes a physical layer security scheme for orthogonal frequency-division multiplexing (OFDM) based transceivers, termed link-signature-based discriminatory channel estimation (LS-DCE), which exploits the space-time uniqueness of the channel responses at different transceiver pairs to facilitate a reliable signal reception at legitimate receivers.
$CSIsnoop$ : Inferring Channel State Information in Multi-User MIMO WLANs
- Computer ScienceIEEE/ACM Transactions on Networking
- 2019
This paper presents CSIsnoop, and shows that an attacker can infer CSI in a multi-user MIMO WLAN, even when both channel sounding sequences from the access point and CSI measurement feedback from the clients are encrypted during downlink (explicit) channel sounding, or when uplink channel sounding is employed.
On the Role of Artificial Noise in Training and Data Transmission for Secret Communications
- Computer ScienceIEEE Transactions on Information Forensics and Security
- 2017
It is shown that the optimal AN power at high SNR should be non-vanishing with respect to the total power, and that AN usage can be more effective in the training phase than in the data transmission phase when the coherence time is large.
Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security
- Computer ScienceIEEE Signal Processing Letters
- 2012
This letter addresses physical layer security in MISO communications in the presence of passive eavesdropper, i.e., the eavesdroppers' channels are unknown to the transmitter and an optimum power allocation strategy between transmitted information and artificial noise is proposed.
Improving Secrecy under High Correlation via Discriminatory Channel Estimation
- Computer Science2018 IEEE International Conference on Communications (ICC)
- 2018
To prevent interception and ensure secrecy, a novel scheme of discriminatory channel estimation (DCE) is redesign, in which training procedures are developed to limit the channel estimation performance at Eve while producing little effect on Alice and Bob.