Basit öğe kaydını göster

dc.contributor.authorHamamreh, Jehad M.
dc.contributor.authorFurqan, Haji Muhammad
dc.contributor.authorAli, Zain
dc.contributor.authorSidhu, Guftaar Ahmad Sardar
dc.date.accessioned10.07.201910:49:13
dc.date.accessioned2019-07-10T19:38:25Z
dc.date.available10.07.201910:49:14
dc.date.available2019-07-10T19:38:25Z
dc.date.issued2017en_US
dc.identifier.citationHamamreh, J., Furqan, H., Ali, Z. ve Sidhu, G. (2017). An efficient security method based on exploiting channel state information (CSI). 15th International Conference on Frontiers of Information Technology (FIT) içinde (288-293.ss.). Islamabad, Pakistan, 18-20 December 2017. https://dx.doi.org/10.1109/FIT.2017.00058en_US
dc.identifier.isbn9781538635674
dc.identifier.urihttps://hdl.handle.net/20.500.12511/1593
dc.identifier.urihttps://dx.doi.org/10.1109/FIT.2017.00058
dc.description.abstractA channel amplitude quantization method that can effectively quantize the channel response using just one single threshold value is proposed in order to extract a random manipulating sequence with good secrecy properties. Specifically, a Time Division Duplex (TDD) wireless system is considered over independent identical distributed (i.i.d.) Rayleigh fast fading channel, where potential passive eavesdroppers (Eves) can only estimate their own channel and have no knowledge about CSI between legitimate communication parties. The transmitter (Alice) is only aware of the CSI of the legitimate user (Bob). Particularly, the proposed security technique takes the bits of the transmitted data packets and manipulate them with a logical vector that characterizes the channel randomness based on the estimated CSI gain. The process of manipulation is implemented on a bit level basis using an XOR operation exactly before modulation process. The same XOR operation is implemented after demodulation process on the detected bits to extract the concealed bits. The obtained simulation results show that the employment of such mechanism can ensure data confidentiality. Furthermore, the simulation results are extended to include the effect of the selected quantization threshold on the BER performance of Eve as well as the amount of information leakage to its side. It is shown that security gap region between Bob and Eve is made very large over all expected Signal to Noise ratio (SNR) values despite the small degradation in the bit error rate (BER) performance of Bob because of the expected channel estimation errors due to noise.en_US
dc.language.isoengen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectChannel State Informationen_US
dc.subjectSecurityen_US
dc.titleAn efficient security method based on exploiting channel state information (CSI)en_US
dc.typeconferenceObjecten_US
dc.relation.ispartof15th International Conference on Frontiers of Information Technology (FIT)en_US
dc.departmentİstanbul Medipol Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Elektrik ve Elektronik Mühendisliği Bölümüen_US
dc.authorid0000-0003-4435-5500en_US
dc.identifier.startpage288en_US
dc.identifier.endpage293en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1109/FIT.2017.00058en_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster