Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Link adaptation for physical layer security over wireless fading channels

Link adaptation for physical layer security over wireless fading channels

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A secure link adaptation framework is proposed, which exploits the inherent fluctuations of wireless fading channels for high-performance communications and physical layer security in the presence of an eavesdropper. The authors use very sharp channel codes intended for reliability and demonstrate that they also provide security, when successfully incorporated in the link adaptation design framework and the security constraint is not very stringent. Two scenarios are considered in which the transmitter has access to the eavesdropper channel state information either instantaneously or statistically. The proposed secure link adaptation framework is formulated to maximise the spectral efficiency of the communication, whereas both reliability and security constraints are provisioned. Different designs are considered when the security constraint is quantified by instantaneous bit error rate (BER), average BER or leakage probability. For the problem with instantaneous BER constraint, an efficient analytical solution and a numerical solution are presented. A closed-form analytical solution is also provided for secure link adaptation with average BER constraint, whereas the problem with the leakage constraint is tackled numerically. Extensive results and detailed analysis are provided to draw insights on the effects of different design parameters on the performance.

References

    1. 1)
      • WiMAX Forum: ‘Mobile WiMAX – Part II: a comparative analysis’, 2006.
    2. 2)
    3. 3)
    4. 4)
      • ETSI EN: ‘DVB-S2 standard specification’, 2005.
    5. 5)
      • J.M. Ortega , W.C. Rheinboldt . (2000) Iterative solution of nonlinear equations in several variables.
    6. 6)
    7. 7)
    8. 8)
    9. 9)
      • Peng, F., Zhang, J., Ryan, W.E.: `Adaptive modulation and coding for IEEE 802.11n', Proc. IEEE Wireless Communications and Networking Conf., 2007, Hong Kong, p. 656–661.
    10. 10)
      • C.E. Shannon . Communication theory of secrecy systems. Bell Syst. Tech. J. , 2 , 656 - 715
    11. 11)
      • Liang, Y., Poor, H.V., Shamai, S.: `Secrecy capacity region of fading broadcast channels', Proc. IEEE Int. Symp. Information Theory, 2007, Nice, France, p. 1291–1295.
    12. 12)
    13. 13)
    14. 14)
    15. 15)
      • D. Wyner . The wiretap channel. Bell. Syst. Tech. J. , 8 , 1355 - 1387
    16. 16)
      • Klinc, D., Ha, J., McLaughlin, S.W., Barros, J., Kwak, B.: `LDPC codes for physical layer security', Proc. IEEE GLOBECOM, 2009, USA, p. 1–6.
    17. 17)
    18. 18)
      • J. Nocedal , S.J. Wright . (1999) Numerical optimization.
    19. 19)
    20. 20)
    21. 21)
      • Liu, R., Poor, H.V.: `Multiple antenna secure broadcast over wireless networks', Proc. IEEE First Int. Workshop on Information Theory for Sensor Networks, 2007, Santa Fe, NM.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2011.0319
Loading

Related content

content/journals/10.1049/iet-com.2011.0319
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address