Implementing physical layer security using transmitters with constellation shaping

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

In wireless communication systems privacy among users contents is a crucial security requirement such as power and spectral efficiency. Spectral and power efficiencies are attainable with power efficient transmission schemes where constellations are decomposed into several BPSK (Bi Phase Shift Keying), being each one amplified and transmitted independently by an antenna. Besides that, due to constellation shaping on the desired transmission direction performed by these transmitters, some kind of physical layer security is assured as well. Under this approach, security is achieved by constellation shaping of the transmitted constellation since each user must know the transmitter configuration parameters associated to the constellation shaping, i.e., the direction in which the constellation is optimized, otherwise the received data would be meaningless. Commonly, security is assured by encrypted algorithms implemented by higher layers, such as private and public encrypted keys. However, system security can be improved with physical layer security schemes since they can be complemented with other security schemes from higher layers. Simulation results show the effectiveness of the proposed approach.

Original languageEnglish
Title of host publication24th International Conference on Computer Communications and Networks, ICCCN 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Volume2015-October
ISBN (Electronic)978-1-4799-9964-4
DOIs
Publication statusPublished - 2 Oct 2015
Event24th International Conference on Computer Communications and Networks, ICCCN 2015 - Las Vegas, United States
Duration: 3 Aug 20156 Aug 2015

Conference

Conference24th International Conference on Computer Communications and Networks, ICCCN 2015
CountryUnited States
CityLas Vegas
Period3/08/156/08/15

    Fingerprint

Keywords

  • Directivity
  • Optimized constellations
  • Physical layer security
  • Power efficient

Cite this

Montezuma de Carvalho, P. M. D. A. B., & Dinis, R. M. H. D. M. (2015). Implementing physical layer security using transmitters with constellation shaping. In 24th International Conference on Computer Communications and Networks, ICCCN 2015 (Vol. 2015-October). [7288418] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCCN.2015.7288418