TY - JOUR
T1 - Fault Tolerant Key Generation and Secure Spread Spectrum Communication
AU - Majid, Arslan Javaid
AU - Moradi, Hussein
AU - Farhang-Boroujeny, Behrouz
N1 - Funding Information:
Manuscript received November 1, 2016; revised March 21, 2017; accepted May 17, 2017. Date of publication June 9, 2017; date of current version August 10, 2017. This work was supported by Battelle Energy Alliance, LLC with the U.S. Department of Energy under Contract DE-AC07-05ID14517. The associate editor coordinating the review of this paper and approving it for publication was J. Lee. (Corresponding author: Arslan Javaid Majid.) A. J. Majid and B. Farhang-Boroujeny are with The University of Utah, Salt Lake City, UT 84112 USA (e-mail: [email protected]; [email protected]).
Publisher Copyright:
© 2002-2012 IEEE.
PY - 2017/8
Y1 - 2017/8
N2 - A fundamental characteristic of wireless communications is in its broadcast nature, which allows accessibility of information without placing restrictions on a user's location. However, accessibility also makes wireless communications vulnerable to eavesdropping. In this context, this paper presents a two-part secure information transmission system. The first part makes use of reciprocity in wireless channels to allow for two asynchronous transceivers to obtain a pair of similar keys. Moreover, a unique augmentation, called strongest path cancellation (SPC), is applied to the keys. In the second part, the concept of artificial noise is introduced to the spread spectrum systems. Keys generated in the first part are used in the spread spectrum system and artificial noise is added to enhance the security of the communications. Two attacks on the proposed security solution are evaluated. First, an adversary following the same steps as the legitimate users is considered. Here, simulation and experimentation results show that SPC provides a boost to security against this type of adversary. The second attack studies an adversary with significant blind detection capabilities. Our observations on this attack indicate that when an ample amount of artificial noise can be used, two legitimate parties can communicate multiple information symbols per key.
AB - A fundamental characteristic of wireless communications is in its broadcast nature, which allows accessibility of information without placing restrictions on a user's location. However, accessibility also makes wireless communications vulnerable to eavesdropping. In this context, this paper presents a two-part secure information transmission system. The first part makes use of reciprocity in wireless channels to allow for two asynchronous transceivers to obtain a pair of similar keys. Moreover, a unique augmentation, called strongest path cancellation (SPC), is applied to the keys. In the second part, the concept of artificial noise is introduced to the spread spectrum systems. Keys generated in the first part are used in the spread spectrum system and artificial noise is added to enhance the security of the communications. Two attacks on the proposed security solution are evaluated. First, an adversary following the same steps as the legitimate users is considered. Here, simulation and experimentation results show that SPC provides a boost to security against this type of adversary. The second attack studies an adversary with significant blind detection capabilities. Our observations on this attack indicate that when an ample amount of artificial noise can be used, two legitimate parties can communicate multiple information symbols per key.
KW - physical layer security
KW - Reciprocal channel key exchange
KW - secure information transmission
KW - spread-spectrum
UR - http://www.scopus.com/inward/record.url?scp=85029599247&partnerID=8YFLogxK
U2 - 10.1109/TWC.2017.2711617
DO - 10.1109/TWC.2017.2711617
M3 - Article
AN - SCOPUS:85029599247
SN - 1536-1276
VL - 16
SP - 5467
EP - 5480
JO - IEEE Transactions on Wireless Communications
JF - IEEE Transactions on Wireless Communications
IS - 8
M1 - 7945468
ER -