Title | ||
---|---|---|
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy |
Abstract | ||
---|---|---|
Secure communication over a wireless channel in the presence of a passive eavesdropper is considered. We present a method to exploit the eavesdropper's inherent receiver vulnerabilities to obtain everlasting secrecy. An ephemeral cryptographic key is pre-shared between the transmitter and the legitimate receiver and is utilized to induce intentional intersymbol interference (ISI). The legitimate receiver uses the key to cancel the ISI while the eavesdropper, since it does not have the key, cannot do such. It is shown that although ISI reduces the capacity of the main channel, it can lead to a net gain in secrecy rate. The achievable secrecy rates for different ISI filter settings are evaluated and the proposed method is compared with other information-theoretic security schemes. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/ISIT.2013.6620766 | Information Theory Proceedings |
Keywords | Field | DocType |
channel capacity,cryptography,intersymbol interference,radio receivers,telecommunication security,wireless channels,ISI filter settings,artificial intersymbol interference,channel capacity,ephemeral cryptographic key,in secrecy rate,information-theoretic security schemes,legitimate receiver,net gain,passive eavesdropper,receiver imperfections,receiver vulnerability,secure communication,transmitter,wireless channel | Transmitter,Intersymbol interference,Wireless,Computer science,Secrecy,Computer network,Communication channel,Channel capacity,Secure communication,Key (cryptography) | Conference |
ISSN | Citations | PageRank |
2157-8095 | 5 | 0.46 |
References | Authors | |
6 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Azadeh Sheikholeslami | 1 | 22 | 3.17 |
Dennis Goeckel | 2 | 1060 | 69.96 |
Hossein Pishro-Nik | 3 | 429 | 45.84 |