{"title":"A wireless secure communication scheme based on polarization scrambling","authors":"Qian Cheng, Jiang Zhu","doi":"10.1109/WOCC.2016.7506557","DOIUrl":null,"url":null,"abstract":"A new wireless secure communication scheme based on polarization scrambling is proposed and analyzed from a secrecy-capacity standpoint. In this approach, the polarization characteristics of transmitting and receiving antennas are controlled by a varying regularity rather than remaining fixed, which is equivalent to scramble the polarization characteristics of antennas. If the eavesdropper doesn't know the varying regularity, it will never recover the original transmitting signals correctly, which guarantees the security of the proposed approach. The simulated results demonstrate that the proposed approach indeed can provide high secrecy capacity and low BER for the legitimate receiver, and it can still achieve positive secrecy capacity even though the legitimate receiver's channel is worse than the eavesdropper's.","PeriodicalId":210863,"journal":{"name":"Wireless and Optical Communications Conference","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless and Optical Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOCC.2016.7506557","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A new wireless secure communication scheme based on polarization scrambling is proposed and analyzed from a secrecy-capacity standpoint. In this approach, the polarization characteristics of transmitting and receiving antennas are controlled by a varying regularity rather than remaining fixed, which is equivalent to scramble the polarization characteristics of antennas. If the eavesdropper doesn't know the varying regularity, it will never recover the original transmitting signals correctly, which guarantees the security of the proposed approach. The simulated results demonstrate that the proposed approach indeed can provide high secrecy capacity and low BER for the legitimate receiver, and it can still achieve positive secrecy capacity even though the legitimate receiver's channel is worse than the eavesdropper's.