Physical Layer Security through Secure Channel Estimation

作者: Fawad Ud Din , Fabrice Labeau

DOI: 10.1109/VTCSPRING.2018.8417694

关键词:

摘要: The random nature of wireless channel can be utilized to achieve secure communications. Recently, there have been some contributions towards finding practical approaches provide physical layer security, but robust and estimates are critical in achieving secrecy. In this paper, we propose that in-band full-duplex communication by the legitimate transceiver pair mask from eavesdropper. proposed estimation technique comprises two stages. first stage, self- interference is estimated respective nodes. second transmission both nodes at while providing equivocation performance analysis shows scheme provides maintaining

参考文章(11)
Amitav Mukherjee, S. Ali A. Fakoorian, Jing Huang, A. Lee Swindlehurst, Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 1550- 1573 ,(2014) , 10.1109/SURV.2014.012314.00178
Melissa Duarte, Chris Dick, Ashutosh Sabharwal, Experiment-Driven Characterization of Full-Duplex Wireless Systems IEEE Transactions on Wireless Communications. ,vol. 11, pp. 4296- 4307 ,(2012) , 10.1109/TWC.2012.102612.111278
S.M. Alamouti, A simple transmit diversity technique for wireless communications IEEE Journal on Selected Areas in Communications. ,vol. 16, pp. 1451- 1458 ,(1998) , 10.1109/49.730453
Vincent Choqueuse, Ali Mansour, Gilles Burel, Ludovic Collin, Koffi Yao, Blind Channel Estimation for STBC Systems Using Higher-Order Statistics IEEE Transactions on Wireless Communications. ,vol. 10, pp. 495- 505 ,(2011) , 10.1109/TWC.2010.112310.091576
Ender Tekin, Aylin Yener, The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming IEEE Transactions on Information Theory. ,vol. 54, pp. 2735- 2751 ,(2008) , 10.1109/TIT.2008.921680
E. De Carvalho, D.T.M. Slock, Cramer-Rao bounds for semi-blind, blind and training sequence based channel estimation international workshop on signal processing advances in wireless communications. pp. 129- 132 ,(1997) , 10.1109/SPAWC.1997.630172
Narendra Anand, Sung-Ju Lee, Edward W. Knightly, STROBE: Actively securing wireless communications using Zero-Forcing Beamforming international conference on computer communications. pp. 720- 728 ,(2012) , 10.1109/INFCOM.2012.6195817
Tsung-Hui Chang, Wei-Cheng Chiang, Y.-W. Peter Hong, Chong-Yung Chi, Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems IEEE Transactions on Signal Processing. ,vol. 58, pp. 6223- 6237 ,(2010) , 10.1109/TSP.2010.2068292
Ta-Yuan Liu, Pin-Hsun Lin, Shih-Chun Lin, Y.-W. Peter Hong, Eduard Axel Jorswieck, To avoid or not to avoid CSI leakage in physical layer secret communication systems IEEE Communications Magazine. ,vol. 53, pp. 19- 25 ,(2015) , 10.1109/MCOM.2015.7355561
Andrea Goldsmith, Wireless Communications ,(2005)