Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in sp...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2009-01-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Online Access: | http://dx.doi.org/10.1155/2009/437824 |
id |
doaj-1eafc71bdd1c4080b99861dd7d7b7374 |
---|---|
record_format |
Article |
spelling |
doaj-1eafc71bdd1c4080b99861dd7d7b73742020-11-24T20:58:11ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992009-01-01200910.1155/2009/437824Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal ConstellationsGill R. TsouriDov WulichA method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors. http://dx.doi.org/10.1155/2009/437824 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Gill R. Tsouri Dov Wulich |
spellingShingle |
Gill R. Tsouri Dov Wulich Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations EURASIP Journal on Wireless Communications and Networking |
author_facet |
Gill R. Tsouri Dov Wulich |
author_sort |
Gill R. Tsouri |
title |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_short |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_full |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_fullStr |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_full_unstemmed |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_sort |
securing ofdm over wireless time-varying channels using subcarrier overloading with joint signal constellations |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1472 1687-1499 |
publishDate |
2009-01-01 |
description |
A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors. |
url |
http://dx.doi.org/10.1155/2009/437824 |
work_keys_str_mv |
AT gillrtsouri securingofdmoverwirelesstimevaryingchannelsusingsubcarrieroverloadingwithjointsignalconstellations AT dovwulich securingofdmoverwirelesstimevaryingchannelsusingsubcarrieroverloadingwithjointsignalconstellations |
_version_ |
1716786309225250816 |