skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations

EURASIP journal on wireless communications and networking, 2009-01, Vol.2009 (1), Article 437824 [Peer Reviewed Journal]

G. R. Tsouri and D. Wulich. 2009. This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. ;ISSN: 1687-1499 ;ISSN: 1687-1472 ;EISSN: 1687-1499 ;DOI: 10.1155/2009/437824

Full text available

Citations Cited by
  • Title:
    Securing OFDM over Wireless Time-Varying Channels Using Subcarrier Overloading with Joint Signal Constellations
  • Author: Tsouri, Gill R. ; Wulich, Dov
  • Subjects: Communications Engineering ; Engineering ; Information Systems Applications (incl.Internet) ; Networks ; Research Article ; Signal,Image and Speech Processing ; Wireless Physical Layer Security
  • Is Part Of: EURASIP journal on wireless communications and networking, 2009-01, Vol.2009 (1), Article 437824
  • Description: A method of overloading subcarriers by multiple transmitters to secure OFDM in wireless time-varying channels is proposed and analyzed. The method is based on reverse piloting, superposition modulation, and joint decoding. It makes use of channel randomness, reciprocity, and fast decorrelation in space to secure OFDM with low overheads on encryption, decryption, and key distribution. These properties make it a good alternative to traditional software-based information security algorithms in systems where the costs associated with such algorithms are an implementation obstacle. A necessary and sufficient condition for achieving information theoretic security in accordance with channel and system parameters is derived. Security by complexity is assessed for cases where the condition for information theoretic security is not satisfied. In addition, practical means for implementing the method are derived including generating robust joint constellations, decoding data with low complexity, and mitigating the effects of imperfections due to mobility, power control errors, and synchronization errors.
  • Publisher: Cham: Springer International Publishing
  • Language: English
  • Identifier: ISSN: 1687-1499
    ISSN: 1687-1472
    EISSN: 1687-1499
    DOI: 10.1155/2009/437824
  • Source: SpringerOpen(OpenAccess)
    ProQuest Central
    DOAJ Directory of Open Access Journals

Searching Remote Databases, Please Wait