Computer Science – Information Theory
Scientific paper
2009-08-26
Globecom 2009
Computer Science
Information Theory
Scientific paper
This paper develops a new physical layer framework for secure two-way wireless communication in the presence of a passive eavesdropper, i.e., Eve. Our approach achieves perfect information theoretic secrecy via a novel randomized scheduling and power allocation scheme. The key idea is to allow Alice and Bob to send symbols at random time instants. While Alice will be able to determine the symbols transmitted by Bob, Eve will suffer from ambiguity regarding the source of any particular symbol. This desirable ambiguity is enhanced, in our approach, by randomizing the transmit power level. Our theoretical analysis, in a 2-D geometry, reveals the ability of the proposed approach to achieve relatively high secure data rates under mild conditions on the spatial location of Eve. These theoretical claims are then validated by experimental results using IEEE 802.15.4-enabled sensor boards in different configurations, motivated by the spatial characteristics of Wireless Body Area Networks (WBAN).
Gamal Aly El
Gamal Hesham El
Youssef Moustafa
No associations
LandOfFree
Randomization for Security in Half-Duplex Two-Way Gaussian Channels does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Randomization for Security in Half-Duplex Two-Way Gaussian Channels, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Randomization for Security in Half-Duplex Two-Way Gaussian Channels will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-623655