Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations

A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in sp...

Full description

Bibliographic Details
Main Authors: Gill R. Tsouri, Dov Wulich
Format: Article
Language:English
Published: SpringerOpen 2009-01-01
Series:EURASIP Journal on Wireless Communications and Networking
Online Access:http://dx.doi.org/10.1155/2009/437824
id doaj-1eafc71bdd1c4080b99861dd7d7b7374
record_format Article
spelling doaj-1eafc71bdd1c4080b99861dd7d7b73742020-11-24T20:58:11ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992009-01-01200910.1155/2009/437824Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal ConstellationsGill R. TsouriDov WulichA method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors. http://dx.doi.org/10.1155/2009/437824
collection DOAJ
language English
format Article
sources DOAJ
author Gill R. Tsouri
Dov Wulich
spellingShingle Gill R. Tsouri
Dov Wulich
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
EURASIP Journal on Wireless Communications and Networking
author_facet Gill R. Tsouri
Dov Wulich
author_sort Gill R. Tsouri
title Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_short Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_full Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_fullStr Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_full_unstemmed Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_sort securing ofdm over wireless time-varying channels using subcarrier overloading with joint signal constellations
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1472
1687-1499
publishDate 2009-01-01
description A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.
url http://dx.doi.org/10.1155/2009/437824
work_keys_str_mv AT gillrtsouri securingofdmoverwirelesstimevaryingchannelsusingsubcarrieroverloadingwithjointsignalconstellations
AT dovwulich securingofdmoverwirelesstimevaryingchannelsusingsubcarrieroverloadingwithjointsignalconstellations
_version_ 1716786309225250816