Spread spectrum communications handbook (revised ed.)
Spread spectrum communications handbook (revised ed.)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Multiuser Detection
Mobile Communications Engineering
Mobile Communications Engineering
Wireless Communications
Evaluation of Security Mechanisms in Wireless Sensor Networks
ICW '05 Proceedings of the 2005 Systems Communications
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Optimal design and placement of pilot symbols for channel estimation
IEEE Transactions on Signal Processing
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
How much training is needed in multiple-antenna wireless links?
IEEE Transactions on Information Theory
Secure space-time communication
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
On the Secrecy Capacity of Fading Channels
IEEE Transactions on Information Theory
Multiuser signaling in the symbol-synchronous AWGN channel
IEEE Transactions on Information Theory
Dynamic key management in sensor networks
IEEE Communications Magazine
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Towards implementing a fully wireless multiple-lead electrocardiograph
Proceedings of the Fifth International Conference on Body Area Networks
Secret agent radio: covert communication through dirty constellations
IH'12 Proceedings of the 14th international conference on Information Hiding
Hi-index | 0.00 |
A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.