Some Recent Results on the Physical Layer Security of Frequency Hopping Systems
نویسندگان
چکیده
This paper considers the physical layer security of frequency hopping (FH) systems. Mainly due to the collision effect among different users, the spectral efficiency of the conventional FH is very low. To overcome this limitation, in this paper, we first propose a general collision-free frequency hopping (CFFH) scheme based on secure spectrum access control; Second, we incorporate the CFFH scheme with OFDMA, and obtain a highly efficient anti-jamming system; Finally, to simplify the secure frequency allocation process in OFDMA based CFFH, we propose an ID based message-driven frequency hopping scheme, which resolves the problem and achieves better jamming resistance with a trade-off in spectral efficiency.
منابع مشابه
Distance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملCryptographic CDMA code hopping (CH-CDMA) for signal security and anti-jamming
Today, military and commercial Spread Spectrum and CDMA transmission systems argue with security on the physical layer based on the secrecy of the seed values of static secure (and insecure) pseudorandom noise generators (PRNG). This should prevent eavesdropping and jamming [1, 2]. Confidentiality, data integrity and authenticity are usually realized in higher protocol layers [3]. Nevertheless,...
متن کاملBUPLE: Securing Passive RFID Communication through Physical Layer Enhancements
Although RFID systems offer many noteworthy characteristics, security and privacy issues associated with them are not easy to address. In this paper, we investigate how to solve the eavesdropping, modification and one particular type of relay attacks toward the tag-to-reader communication in passive RFID systems without requiring lightweight ciphers or secret credentials shared by legitimate pa...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کاملDesign and Analysis of Security Schemes for Low-cost RFID Systems
With the remarkable progress in microelectronics and low-power semiconductor technologies, Radio Frequency IDentification technology (RFID) has moved from obscurity into mainstream applications, which essentially provides an indispensable foundation to realize ubiquitous computing and machine perception. However, the catching and exclusive characteristics of RFID systems introduce growing secur...
متن کامل