Due to the enormous spreading of applied wireless networks, security is actually one of the most important issues for telecommunications. One of the main issue in the field of securing wireless information exchanging is the initial common knowledge between source and destination. A shared secret is normally mandatory in order to decide the encryption (algorithm or code or key) of the information stream. It is usual to exchange this common a priori knowledge by using a “secure” channel. Nowadays a secure wireless channel is not possible. In fact normally the common a priori knowledge is already established (but this is not secure) or by using a non-radio channel (that implies a waste of time and resource). The information is encrypted by means of a private key that must be known by both the transmitter and the receiver. One of the main weak point about security is the private key exchanging interval. The key cannot be public and cannot be known a priori. The problem is how to exchange this private key through a totally secure wireless channel. This contribution deals with the review of the main physical layer techniques for encrypting the information and the proposal of a new physical layer technique ensuring secure communication in a full wireless environment. The information is modulated, at physical layer, by the thermal noise experienced by the link between two terminals. A loop scheme is designed for unique recovering of mutual information. The probability of error/detection is analytically derived for the legal users and for the third unwanted listener (passive or active attacker). Both the case of passive and active attacks have also been implemented and simulated by using Matlab-Simulink software. The analytical results have been compared to the simulated ones. All the results show that the performance of the proposed scheme yields the advantage of intrinsic security, i.e., the mutual information cannot be physically demodulated (passive attack) or denied (active attack) by a third terminal.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Shannon C. (1949) Communication theory of secrecy systems. Bell System Technical Journal 29: 656–715
IEEE 802.16-2004. (2004). IEEE standard for local and metropolitan area networks part 16: Air interface for fixed broadband wireless access systems.
ANSI/IEEE Std 802.11. (1999). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications.
IEEE Std 802.11i. (2004). Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, amendment 6: Medium access control (MAC) security enhancements.
IEEE Std 802.15.1. (2005). IEEE standard local and metropolitan area networks–part 15.1: Wireless medium access control (MAC) and physical layer (PHY) specifications for wireless personal area networks (WPANs).
Kent, S., & Seo, K. (2005). Security architecture for the internet protocol, internet engineering task force, RFC 4301.
Bennett, C. H., & Brassard, G. (1984). Proceedings of IEEE international conference on computers systems and signal processing, Bangalore, India pp. 175–179
Hero A. O. III. (2003) Secure space-time communication. IEEE transactions on information theory 49(12): 3235–3249
Maurer U. (1993) Secret key agreement by public discussion from common information. IEEE transactions on information theory 39(3): 733–742
Wyner A. D. (1975) The wire-tap channel. Bell System Technical Journal 54(8): 1355–1387
Csiszar I., Korner J. (1978) Broadcast channels with confidential messages. IEEE transactions on information theory 24(3): 339–348
Sharbaf, M. S. (2009). Quantum cryptography: A new generation of information technology security system, information technology: New generations. ITNG ’09. Sixth international conference on, 27–29 April, pp. 1644–1648.
Wilson R., Tse D., Scholtz R.A. (2007) Channel identification: Secret sharing using reciprocity in ultrawideband channels. IEEE Transactions on Information Forensics and Security 2(3): 270–275
Hyungjin K., Villasenor J. D. (2008) Secure MIMO communications in a system with equal numbers of transmit and receive antennas. IEEE Communications Letters 12(5): 386–388
Li, X., & Ratazzi, E. P. (2005). MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks. IEEE military communications conference (MILCOM’2005) Atlantic City, NJ, Oct. 17–20.
Mohammadi, M. S. (2009). MIMO minimum leakage—physically secure wireless data transmission, application of information and communication technologies. AICT 2009. International Conference on, 14–16, pp. 1–5.
About this article
Cite this article
Mucchi, L., Ronga, L.S. & Del Re, E. A Novel Approach for Physical Layer Cryptography in Wireless Networks. Wireless Pers Commun 53, 329–347 (2010). https://doi.org/10.1007/s11277-010-9950-6
- Physical layer security
- Key exchange
- Noise loop
- Wireless communications