Affiliation:
1. University of Benghazi, Libya
2. German Jordanian University, Jordan
Abstract
This chapter proposes computationally secure physical layer wireless communication for multiple–input multiple–output (MIMO) systems. The algorithm presented is applicable across various MIMO configurations and resistant to attacks. It relies on accurate knowledge of wireless channel characteristics and channel reciprocity. Both transmitter and legitimate receiver generate a permutation vector based on channel fading paths to create the security key. The vast number of potential combinations makes decryption nearly infeasible. Additionally, secrecy rate analysis is introduced, considering space modulation techniques (SMTs) and spatial multiplexing (SMX) MIMO approaches, evaluating mutual information and average bit error rate (ABER) at both ends. Various SMTs schemes including space shift keying (SSK), spatial modulation (SM), and quadrature spatial modulation (QSM) are examined to validate the derived formulations.
Reference42 articles.
1. Analyzing the Ergodic Secrecy Rates of Cooperative Amplify-and-Forward Relay Networks over Generalized Fading Channels
2. Related-key cryptanalysis of the full AES-192 and AES-256. Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009;A.Biryukov;Proceedings,2009
3. Covert Communication Over Noisy Channels: A Resolvability Perspective
4. Secrecy Rate Analysis in The Cooperative Communication System
5. Beam-Space Multiplexing: Practice, Theory, and Trends, From 4G TD-LTE, 5G, to 6G and Beyond