Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations

<p/> <p>A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast...

Full description

Bibliographic Details
Main Authors: Wulich Dov, Tsouri GillR
Format: Article
Language:English
Published: SpringerOpen 2009-01-01
Series:EURASIP Journal on Wireless Communications and Networking
Online Access:http://jwcn.eurasipjournals.com/content/2009/437824
id doaj-53933a5c8bde4b05b0ece0e8fed12260
record_format Article
spelling doaj-53933a5c8bde4b05b0ece0e8fed122602020-11-24T20:41:59ZengSpringerOpenEURASIP Journal on Wireless Communications and Networking1687-14721687-14992009-01-0120091437824Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal ConstellationsWulich DovTsouri GillR<p/> <p>A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.</p>http://jwcn.eurasipjournals.com/content/2009/437824
collection DOAJ
language English
format Article
sources DOAJ
author Wulich Dov
Tsouri GillR
spellingShingle Wulich Dov
Tsouri GillR
Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
EURASIP Journal on Wireless Communications and Networking
author_facet Wulich Dov
Tsouri GillR
author_sort Wulich Dov
title Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_short Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_full Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_fullStr Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_full_unstemmed Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
title_sort securing ofdm over wireless time-varying channels using subcarrier overloading with joint signal constellations
publisher SpringerOpen
series EURASIP Journal on Wireless Communications and Networking
issn 1687-1472
1687-1499
publishDate 2009-01-01
description <p/> <p>A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.</p>
url http://jwcn.eurasipjournals.com/content/2009/437824
work_keys_str_mv AT wulichdov securingofdmoverwirelesstimevaryingchannelsusingsubcarrieroverloadingwithjointsignalconstellations
AT tsourigillr securingofdmoverwirelesstimevaryingchannelsusingsubcarrieroverloadingwithjointsignalconstellations
_version_ 1716823645697867776