© The Institution of Engineering and Technology
A secure link adaptation framework is proposed, which exploits the inherent fluctuations of wireless fading channels for high-performance communications and physical layer security in the presence of an eavesdropper. The authors use very sharp channel codes intended for reliability and demonstrate that they also provide security, when successfully incorporated in the link adaptation design framework and the security constraint is not very stringent. Two scenarios are considered in which the transmitter has access to the eavesdropper channel state information either instantaneously or statistically. The proposed secure link adaptation framework is formulated to maximise the spectral efficiency of the communication, whereas both reliability and security constraints are provisioned. Different designs are considered when the security constraint is quantified by instantaneous bit error rate (BER), average BER or leakage probability. For the problem with instantaneous BER constraint, an efficient analytical solution and a numerical solution are presented. A closed-form analytical solution is also provided for secure link adaptation with average BER constraint, whereas the problem with the leakage constraint is tackled numerically. Extensive results and detailed analysis are provided to draw insights on the effects of different design parameters on the performance.
References
-
-
1)
-
WiMAX Forum: ‘Mobile WiMAX – Part II: a comparative analysis’, 2006.
-
2)
-
P. Gopala ,
L. Lai ,
H.E. Gamal
.
On the secrecy capacity of fading channels.
IEEE Trans. Inform. Theory
,
10 ,
4687 -
4698
-
3)
-
J.S. Harsini ,
F. Lahouti
.
Adaptive transmission policy design for delay-sensitive and bursty packet traffic over wireless fading channels.
IEEE Trans. Wirel. Commun.
,
2 ,
776 -
786
-
4)
-
ETSI EN: ‘DVB-S2 standard specification’, 2005.
-
5)
-
J.M. Ortega ,
W.C. Rheinboldt
.
(2000)
Iterative solution of nonlinear equations in several variables.
-
6)
-
Q. Liu ,
S. Zhou ,
G.B. Giannakis
.
Cross-layer combining of adaptive modulation and coding with truncated ARQ over wireless link.
IEEE Trans. Wirel. Commun.
,
5 ,
1746 -
1755
-
7)
-
J.S. Harsini ,
F. Lahouti
.
Quality of service constrained throughput optimisation for joint adaptive transmission with automatic repeat request over block-fading channels.
IET Commun.
,
6 ,
1030 -
1040
-
8)
-
T.S. Chung ,
A.J. Goldsmith
.
Degrees of freedom in adaptive modulation: a unified view.
IEEE Trans. Commun.
,
9 ,
1561 -
1571
-
9)
-
Peng, F., Zhang, J., Ryan, W.E.: `Adaptive modulation and coding for IEEE 802.11n', Proc. IEEE Wireless Communications and Networking Conf., 2007, Hong Kong, p. 656–661.
-
10)
-
C.E. Shannon
.
Communication theory of secrecy systems.
Bell Syst. Tech. J.
,
2 ,
656 -
715
-
11)
-
Liang, Y., Poor, H.V., Shamai, S.: `Secrecy capacity region of fading broadcast channels', Proc. IEEE Int. Symp. Information Theory, 2007, Nice, France, p. 1291–1295.
-
12)
-
M.S. Alouini ,
A.J. Goldsmith
.
Adaptive modulation over Nakagami fading channels.
Wirel. Pers. Commun.
,
1 ,
119 -
143
-
13)
-
A. Thangaraj ,
S. Dihidar ,
A.R. Calderbank ,
S.W. McLaughlin ,
J.M. Merolla
.
Application of LDPC codes to the wiretap channel.
IEEE Trans. Inform. Theory
,
8 ,
2933 -
2945
-
14)
-
K.J. Arrow ,
A.C. Enthoven
.
Quasi-concave programming.
Econometrica.
,
4 ,
779 -
800
-
15)
-
D. Wyner
.
The wiretap channel.
Bell. Syst. Tech. J.
,
8 ,
1355 -
1387
-
16)
-
Klinc, D., Ha, J., McLaughlin, S.W., Barros, J., Kwak, B.: `LDPC codes for physical layer security', Proc. IEEE GLOBECOM, 2009, USA, p. 1–6.
-
17)
-
D.J.C. MacKay ,
C.P. Hesketh
.
Performance of low density parity check codes as a function of actual and assumed noise levels.
Electr. Notes Theor. Comput. Sci.
,
89 -
96
-
18)
-
J. Nocedal ,
S.J. Wright
.
(1999)
Numerical optimization.
-
19)
-
I. Csiszar ,
J. Korner
.
Broadcast channels with confidential messages.
IEEE Trans. Inf. Theory
,
3 ,
339 -
348
-
20)
-
Y. Liang ,
A. Somekh-Baruch ,
H.V. Poor ,
S. Shamai
.
Capacity of cognitive interference channels with and without secrecy.
IEEE Trans. Inform. Theory
,
2 ,
604 -
619
-
21)
-
Liu, R., Poor, H.V.: `Multiple antenna secure broadcast over wireless networks', Proc. IEEE First Int. Workshop on Information Theory for Sensor Networks, 2007, Santa Fe, NM.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2011.0319
Related content
content/journals/10.1049/iet-com.2011.0319
pub_keyword,iet_inspecKeyword,pub_concept
6
6