2021
DOI: 10.1109/ojcoms.2021.3112486
|View full text |Cite
|
Sign up to set email alerts
|

Artificially Time-Varying Differential MIMO for Achieving Practical Physical Layer Security

Abstract: In this paper, we propose a differential multiple-input multiple-output (MIMO) scheme based on the novel concept of chaos-based time-varying unitary matrices to demonstrate-for the first time in the literature-the ability of differential encoding in achieving practical physical layer security even without the need for using channel estimation. In the proposed scheme, an erroneous secret key, which is extracted from the wireless nature, is used to initialize a chaos sequence that is responsible for generating a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 76 publications
(164 reference statements)
0
6
0
Order By: Relevance
“…Our first assessment, depicted in Fig. 8, is the information leakage [11] to Eve, measured as 1 − 2 × BER Eve , with BER Eve given by the average bits in error in the symbols X(i) detected by Eve under equation (40), using projection matrices Ê1 estimated by solving equation (39), and given received signals ỸEve obtained in the absence of noice, as described by equation (37). The figure shows plots of such leakage as a function of the number of transmit antennas M , varied from M = 2 to 128, and for different configurations receive antennas at Eve, varying from N Eve = 2 to N Eve = 16.…”
Section: Security Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Our first assessment, depicted in Fig. 8, is the information leakage [11] to Eve, measured as 1 − 2 × BER Eve , with BER Eve given by the average bits in error in the symbols X(i) detected by Eve under equation (40), using projection matrices Ê1 estimated by solving equation (39), and given received signals ỸEve obtained in the absence of noice, as described by equation (37). The figure shows plots of such leakage as a function of the number of transmit antennas M , varied from M = 2 to 128, and for different configurations receive antennas at Eve, varying from N Eve = 2 to N Eve = 16.…”
Section: Security Performance Evaluationmentioning
confidence: 99%
“…In light of the above, the main idea of PLS is to exploit physical features of wireless channels [7][8][9][10][11], to design quantum resilient, and eventually quantum-proof (a.k.a postquantum) security solutions. To cite a few examples, in [7], the randomness of extracted channel state information (CSI) in massive MIMO systems is used to construct linear precoding matrices that provide post-quantum security via large-scale beamforming and large constellation sizes.…”
Section: Introductionmentioning
confidence: 99%
“…A MIMO scheme for practical physical-layer security was presented by Ishikawa et al (2021). It employs chaos-based unitary matrices to eliminate the need for channel estimation.…”
Section: Introductionmentioning
confidence: 99%
“…In light of the above, the main idea of PLS is to exploit physical features of wireless channels [7], [8], [9], [10], [11], to design quantum resilient, and eventually quantum-proof (a.k.a post-quantum) security solutions. To cite a few examples, in [7], the randomness of extracted channel state information (CSI) in massive MIMO systems is used to construct linear precoding matrices that provide post-quantum security via large-scale beamforming and large constellation sizes.…”
mentioning
confidence: 99%
“…Similarly, in [8], security is incorporated into STBC schemes by translating random received signal strength indicators into phase rotations of transmit symbols, while in [9], the reciprocal phase of the channel between Alice and Bob is used as a seed for the legitimate pair to select the modulation they employed. In turn, in the chaos-based approaches of [10] and [11], a secret key is projected onto a space-time codeword and onto a time-varying unitary matrix, respectively.…”
mentioning
confidence: 99%