physical layer security
Recently Published Documents


TOTAL DOCUMENTS

1596
(FIVE YEARS 650)

H-INDEX

59
(FIVE YEARS 17)

2022 ◽  
Vol 12 (2) ◽  
pp. 641
Author(s):  
Junsung Choi ◽  
Dongryul Park ◽  
Suil Kim ◽  
Seungyoung Ahn

Along with the development of electromagnetic weapons, Electronic Warfare (EW) has been rising as the future form of war. Especially in the area of wireless communications, high security defense systems such as Low Probability of Detection (LPD), Low Probability of Interception (LPI), and Low Probability of Exploitation (LPE) communication algorithms are being studied to prevent military force loss. One LPD, LPI, and LPE communication algorithm, physical-layer security, has been discussed and studied. We propose a noise signaling system, a type of physical-layer security, which modifies conventionally modulated I/Q data into a noise-like shape. To suggest the possibility of realistic implementation, we use Software-Defined Radio (SDR). Since there are certain hardware limitations, we present the limitations, requirements, and preferences of practical implementation of the noise signaling system. The proposed system uses ring-shaped signaling, and we present a ring-shaped signaling system algorithm, SDR implementation methodology, and performance evaluations of the system using the metrics of Bit Error Rate (BER) and Probability of Modulation Identification (PMI), which we obtain by using a Convolutional Neural Network (CNN) algorithm. We conclude that the ring-shaped signaling system can perform high LPI/LPE communication functioning because an eavesdropper cannot obtain the correct modulation scheme information. However, the performance can vary with the configurations of the I/Q data-modifying factors.


Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 370
Author(s):  
Ruijie Guo ◽  
Chunling Fu ◽  
Yong Jin ◽  
Zhentao Hu ◽  
Lin Zhou

This paper considers the physical layer security (PLS) of a simultaneous wireless information and power transfer (SWIPT) relay communication system composed of a legitimate source–destination pair and some eavesdroppers. Supposing a disturbance of channel status information (CSI) between relay and eavesdroppers in a bounded ellipse, we intend to design a robust beamformer to maximum security rate in the worst case on the constraints of relay energy consumption. To handle this non-convex optimization problem, we introduce a slack variable to transform the original problem into two sub-problems firstly, then an algorithm employing a semidefinite relaxation (SDR) technique and S-procedure is proposed to tackle above two sub-problems. Although our study was conducted in the scene of a direct link among source, destination, and eavesdroppers that is non-existing, we demonstrate that our conclusions can be easily extended to the scene for which a direct link among source, destination and eavesdroppers exist. Numerical simulation results compared with the benchmark scheme are provided to prove the effectiveness and superior performance of our algorithm.


Author(s):  
Sung Joon Maeng ◽  
Yavuz Yapici ◽  
Ismail Guvenc ◽  
Arupjyoti Bhuyan ◽  
Huaiyu Dai

2021 ◽  
Vol 7 (4) ◽  
pp. 119-127
Author(s):  
A. Gerasimovich

In the current paper, some methods of information security protocols based on physical layer security are considered. It is proved that well known Shamir’s protocol can be applied to RSA cryptosystem but not to Rabin, Mac-Ellice and trellis based cryptosystems.The main stream of this paper is a description of key sharing protocol on constant public and noiseless channels (like Internet). It is shown that it is able to provide a high reliability and control of security in terms of Shannon’s information providing nothing-additional requirements to communication channels and without any cryptographic assumptions.


Sign in / Sign up

Export Citation Format

Share Document