Dakota Flanary, Benjamin Jensen, Bradford Clark, Kalin Norman, Nathan Nelson, M. Rice, Willie K. Harrison
{"title":"Manufacturing an Erasure Wiretap Channel from Channel Sounding Measurements","authors":"Dakota Flanary, Benjamin Jensen, Bradford Clark, Kalin Norman, Nathan Nelson, M. Rice, Willie K. Harrison","doi":"10.1109/ISIT.2019.8849638","DOIUrl":null,"url":null,"abstract":"In this paper we provide a real-world test of physical-layer security using channel sounding techniques in an indoor wireless network. We consider the possibility of exploiting issues that arise in practical receivers to manufacture a discrete memoryless wiretap channel model from the Gaussian case, and show how the secrecy capacity of the Gaussian wiretap channel model changes as these issues are considered. Results indicate that the secrecy capacity is a function of the manufactured channel model, physical antenna location, and power settings at the transmitter. These parameters can be optimized to maximize the potential for secrecy in the network.","PeriodicalId":6708,"journal":{"name":"2019 IEEE International Symposium on Information Theory (ISIT)","volume":"4 1","pages":"320-324"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Information Theory (ISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.2019.8849638","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In this paper we provide a real-world test of physical-layer security using channel sounding techniques in an indoor wireless network. We consider the possibility of exploiting issues that arise in practical receivers to manufacture a discrete memoryless wiretap channel model from the Gaussian case, and show how the secrecy capacity of the Gaussian wiretap channel model changes as these issues are considered. Results indicate that the secrecy capacity is a function of the manufactured channel model, physical antenna location, and power settings at the transmitter. These parameters can be optimized to maximize the potential for secrecy in the network.