Exploiting the physical layer for enhanced security

نویسندگان

  • Suhas Mathur
  • Alex Reznik
  • Chunxuan Ye
  • R. Mukherjee
  • A. Rahman
  • Yogendra Shah
  • Wade Trappe
  • Narayan B. Mandayam
چکیده

While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the unique properties of the wireless domain to address security threats. The wireless medium is a powerful source of domain-specific information that can complement and enhance traditional security mechanisms. In this article, we argue that new security paradigms that exploit physical layer properties of the wireless medium, such as the rapid spatial, spectral and temporal decorrelation properties of the radio channel, can enhance confidentiality and authentication services. We outline some basic constructions for these services, and then provide a case study for how such strategies can be integrated into a broader security framework for a wireless network.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A MIMO Based Cross-layer Approach to Augment the Security of Wireless Networks

In this work, we propose a novel MIMO-aided security scheme. By exploiting an extra dimension provided by MIMO systems for adding artificial noise to the transmission process, the physical-layer security is enhanced as a result. In the proposed scheme the physical-layer may rely on upper-layer encryption techniques for security, which results in a cross-layer security scheme.

متن کامل

Applications of Game Theory for Physical Layer Security

This chapter provides a comprehensive review of the domain of game theory based physical layer security in wireless communications. By exploiting the wireless channel characteristic and secure cooperation of nodes, physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encry...

متن کامل

A Physical-Layer Authentication Assisted Scheme for Enhancing 3GPP Authentication

The broadcast nature of radio propagation makes wireless networks vulnerable to eavesdropping attacks. To enhance authentication strength in wireless networks, various physical layer authentication schemes were proposed by exploiting physical layer characteristics. Recently, we proposed a novel PHYsical layer Phase Challenge-Response Authentication Scheme (PHY-PCRAS), which exploits both the re...

متن کامل

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Wireless Commun.

دوره 17  شماره 

صفحات  -

تاریخ انتشار 2010