Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security. In the early days of the Internet, its layered protocol stack did not consider security as a primary concern. Since then a significant amount of literature has been published. This chapter proposes a watermark‐based blind physical layer security (WBPLSec) utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, regardless of the eavesdropper position. The theoretical analysis let us draw a secure region around the legitimate receiver. Results indicate how the WBPLSec aims to be a valuable technique for deploying physical layer security. Authors utilized the outage probability of secrecy capacity for assessing the secure communication.

Physical Layer Security / Soderi, Simone; Mucchi, Lorenzo; Hämäläinen, Matti; Piva, Alessandro; Iinatti, Jari. - STAMPA. - (2018), pp. 117-141. [10.1002/9781119293071.ch6]

Physical Layer Security

Mucchi, Lorenzo
;
Piva, Alessandro;
2018

Abstract

Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security. In the early days of the Internet, its layered protocol stack did not consider security as a primary concern. Since then a significant amount of literature has been published. This chapter proposes a watermark‐based blind physical layer security (WBPLSec) utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, regardless of the eavesdropper position. The theoretical analysis let us draw a secure region around the legitimate receiver. Results indicate how the WBPLSec aims to be a valuable technique for deploying physical layer security. Authors utilized the outage probability of secrecy capacity for assessing the secure communication.
2018
9781119293071
9781119293040
A Comprehensive Guide to 5G Security
117
141
Soderi, Simone; Mucchi, Lorenzo; Hämäläinen, Matti; Piva, Alessandro; Iinatti, Jari
File in questo prodotto:
File Dimensione Formato  
c06.pdf

Accesso chiuso

Tipologia: Pdf editoriale (Version of record)
Licenza: Tutti i diritti riservati
Dimensione 1.8 MB
Formato Adobe PDF
1.8 MB Adobe PDF   Richiedi una copia

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/1159918
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact