Abstract

Due to the channel estimation error, most of the physical layer secret key generation schemes need information reconciliation to correct error key bits, resulting in reduced efficiency. To solve the problem, this work proposes a novel secure communication scheme based on a equivalent interference channel. Different keys generated from imperfect channel state information are directly applied to signal scrambling and descrambling, which is equivalent to the process of a signal passing through an interference channel. Legitimate communication parties can reduce interference with the help of similar keys and channel coding without sending additional signals, while the eavesdropper channel is deteriorated due to the spatial decorrelation. For this kind of schemes, we first establish a discrete memoryless broadcast channel model to derive the expressions of bit error rate (BER), channel capacity, and security capacity for performance analysis. Simulation results verify the derivations that the proposed scheme achieves secure communication with a correlated eavesdropping channel and has a higher upper bound of transmission rate. Furthermore, we design a new metric to evaluate the efficiency and the result shows that the proposed scheme has superior performance on error reconciliation efficiency, despite its slight increase in BER.

Highlights

  • With the rapid popularization of the 5th generation wireless systems (5G), the confidentiality of wireless communications is receiving extensive attention. e mainstream approach to information protection is the modern cryptography based on preagreed key [1]

  • Based on the previous work, this paper proposes a novel secure communication scheme based on equivalent interference channel (EIC)

  • (b)ζ for various η when linear block code is used the key bits. At this time, sending a useless reconciliation signal of the same length as the confidential information will reduce the efficiency by half. erefore, these results indicate that the scheme based on EIC is more cost-saving and has higher error reconciliation efficiency

Read more

Summary

Introduction

With the rapid popularization of the 5th generation wireless systems (5G), the confidentiality of wireless communications is receiving extensive attention. e mainstream approach to information protection is the modern cryptography based on preagreed key [1]. Recent studies have applied similar ideas to physical layer authentication in [23, 24] and to ST in [25, 26] They still need to send additional signals for secret key quantization or verification, increasing overhead. Research studies such as [10, 27] have done a lot of work in key generation and secure channel capacity, the analysis of these new solutions that directly scramble signals by asymmetric secret keys is still rare, which makes it difficult to evaluate or optimize system performance. (i) e physical layer keys in proposed scheme are used to scramble the encoded signal instead of encrypting original confidential information, and the error bits in received signals can be corrected by channel coding. Channel complex gains of Alice-Bob and Alice-Eve Correlation coefficient between hAB and hAE Confidential information Encoded information of Alice Signal after scrambling of Alice Received signal of Bob Signal after descrambling of Bob Received signal of Eve Signal after descrambling of Eve Secret key sequences of Alice, Bob, and Eve

Wireless Channel Model
Overview of Existing and Proposed Schemes
Process of the Proposed Scheme
Performance Evaluation
Conclusion and Future
Proof of Theorem 1
Proof of Theorem 2

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.