Physical layer security using boundary technique for emerging wireless communication systems

IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
I. A. Sikiru, L. Olawoyin, N. Faruk, A. Oloyede, A. Abdulkarim, Imam-Fulani Yusuf Olayinka, O. Sowande, Salisu Garba, A. Imoize
{"title":"Physical layer security using boundary technique for emerging wireless communication systems","authors":"I. A. Sikiru, L. Olawoyin, N. Faruk, A. Oloyede, A. Abdulkarim, Imam-Fulani Yusuf Olayinka, O. Sowande, Salisu Garba, A. Imoize","doi":"10.1002/spy2.288","DOIUrl":null,"url":null,"abstract":"The broadcast nature of radio propagation in wireless communication has been suspected as the loopholes of passive or active attacks by unauthorized users (eavesdroppers). The physical layer security techniques operate at the lowest stack of OSI layer against conventional cryptographic approaches, operating at the upper layer. However, techniques such as channel coding, power (directional antenna and artificial noise), and spread spectrum have been (and continuously) deployed to safeguard against sophisticated attacks. Most of these deployments are theoretical, and a few are enhanced for efficient security against an intruder. In this article, a boundary technique approach is proposed and applied to the physical layer to improve its secrecy‐capacity and subdue adversary effects at the legitimate receiver. Hybrid performance metrics were adopted, and a Monte Carlo simulation was performed. The result obtained using secrecy outage probability, secrecy‐capacity, and intercept‐probability show that our proposed techniques enhance the secret transmission between the main transmitter and legitimate receiver. The simulation results were compared with the analytical methods. It was found that the channel between the transmitter and the main receiver has a better signal‐to‐noise ratio than the corresponding eavesdropper's channel. Conclusively, performance of the proposed technique is validated for applications in emerging wireless communication systems.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/spy2.288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The broadcast nature of radio propagation in wireless communication has been suspected as the loopholes of passive or active attacks by unauthorized users (eavesdroppers). The physical layer security techniques operate at the lowest stack of OSI layer against conventional cryptographic approaches, operating at the upper layer. However, techniques such as channel coding, power (directional antenna and artificial noise), and spread spectrum have been (and continuously) deployed to safeguard against sophisticated attacks. Most of these deployments are theoretical, and a few are enhanced for efficient security against an intruder. In this article, a boundary technique approach is proposed and applied to the physical layer to improve its secrecy‐capacity and subdue adversary effects at the legitimate receiver. Hybrid performance metrics were adopted, and a Monte Carlo simulation was performed. The result obtained using secrecy outage probability, secrecy‐capacity, and intercept‐probability show that our proposed techniques enhance the secret transmission between the main transmitter and legitimate receiver. The simulation results were compared with the analytical methods. It was found that the channel between the transmitter and the main receiver has a better signal‐to‐noise ratio than the corresponding eavesdropper's channel. Conclusively, performance of the proposed technique is validated for applications in emerging wireless communication systems.
基于边界技术的新兴无线通信系统物理层安全
无线通信中无线电传播的广播性一直被怀疑是未经授权的用户(窃听者)被动或主动攻击的漏洞。物理层安全技术在OSI层的最低层运行,而传统的加密方法在上层运行。然而,诸如信道编码、功率(定向天线和人工噪声)和扩频等技术已经(并不断)被部署以防止复杂的攻击。这些部署中的大多数都是理论上的,其中一些是为了有效地防御入侵者而增强的。在本文中,提出了一种边界技术方法,并将其应用于物理层,以提高其保密能力并抑制合法接收方的敌对影响。采用混合性能指标,进行蒙特卡洛仿真。使用保密中断概率、保密容量和拦截概率得到的结果表明,我们提出的技术增强了主发送器和合法接收器之间的秘密传输。仿真结果与解析方法进行了比较。研究发现,发射机与主接收机之间的信道比窃听者的相应信道具有更好的信噪比。最后,在新兴的无线通信系统中验证了所提出技术的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
5.30%
发文量
80
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信