Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
<p/> <p>A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2009-01-01
|
Series: | EURASIP Journal on Wireless Communications and Networking |
Online Access: | http://jwcn.eurasipjournals.com/content/2009/437824 |
id |
doaj-53933a5c8bde4b05b0ece0e8fed12260 |
---|---|
record_format |
Article |
spelling |
doaj-53933a5c8bde4b05b0ece0e8fed122602020-11-24T20:41:59ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992009-01-0120091437824Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal ConstellationsWulich DovTsouri GillR<p/> <p>A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.</p>http://jwcn.eurasipjournals.com/content/2009/437824 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Wulich Dov Tsouri GillR |
spellingShingle |
Wulich Dov Tsouri GillR Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations EURASIP Journal on Wireless Communications and Networking |
author_facet |
Wulich Dov Tsouri GillR |
author_sort |
Wulich Dov |
title |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_short |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_full |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_fullStr |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_full_unstemmed |
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations |
title_sort |
securing ofdm over wireless time-varying channels using subcarrier overloading with joint signal constellations |
publisher |
SpringerOpen |
series |
EURASIP Journal on Wireless Communications and Networking |
issn |
1687-1472 1687-1499 |
publishDate |
2009-01-01 |
description |
<p/> <p>A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.</p> |
url |
http://jwcn.eurasipjournals.com/content/2009/437824 |
work_keys_str_mv |
AT wulichdov securingofdmoverwirelesstimevaryingchannelsusingsubcarrieroverloadingwithjointsignalconstellations AT tsourigillr securingofdmoverwirelesstimevaryingchannelsusingsubcarrieroverloadingwithjointsignalconstellations |
_version_ |
1716823645697867776 |