4.7 Article

PLS-IoT Enhancement Against Eavesdropping via Spatially Distributed Constellation Obfuscation

期刊

IEEE WIRELESS COMMUNICATIONS LETTERS
卷 12, 期 9, 页码 1508-1512

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/LWC.2023.3279989

关键词

Physical layer security; confidentiality; constel-lation obfuscation; symbol rotation; coordinated system

向作者/读者索取更多资源

This article introduces a scheme that provides highly reliable and secure algorithm in the Internet of Things. The scheme adopts asymmetric multi-level physical layer security technology, which provides security protection for legitimate links and simplifies receiver design. Numerical results show that the scheme effectively confounds eavesdroppers without compromising the bit error rate of the intended receiver.
Wireless communication has become a ubiquitous facet of modern-day life. With the advent of Internet of Things (IoT) and massive machine-type connectivity, the number of devices is expected to increase even more. However, increased dependence on wireless connectivity is marred with risks related to user privacy and data confidentiality, especially for low-power IoT devices. Therefore, it is imperative to provide an extremely reliable secure algorithm with minimal complexity and computational expense in IoT paradigm. With that in mind, this letter presents asymmetric multi-level physical layer security (PLS) scheme, in which each transmitted symbol undergoes two types of distortion: channel-based phase distortion and multi-reception amplitude randomization. The proposed scheme offers a substantial security advantage for legitimate links, while also streamlining receiver design. Numerical results indicate that the scheme effectively confounds eavesdroppers without compromising the bit error rate of the intended receiver. Additionally, the proposed scheme provides another level of security by concealing the modulation information, requiring the receiver to detect the modulation scheme before detecting transmitted symbols.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据