How effective is the artificial noise? Real-time analysis of a PHY security scenario

Selahattin Goekceli, Oezge Cepheli, Semiha Tedik Basaran, Guenes Karabulut Kurt, Guido Dartmann, Gerd Ascheid

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

Expanding usage of mobile technologies and devices causes new challenges, especially in terms of security. In the near future, the number of battery powered devices will also significantly increase. Current security approaches are not sufficient for these issues and high-complexity cryptographic techniques are not suitable for such devices. To address these problems, physical layer (PHY) security solutions have recently emerged. Some 5G candidate techniques such as full-duplex communication (FD) and artificial noise transmission (AN) are exploited in various PHY security solutions due to their performance advantages. In this study, a scenario resembling a factory environment is considered and security level is analyzed in real-time by utilizing FD and AN methods. The aim of this analysis is to investigate physically secure transmission regions and to expand these regions by intelligently using AN. Our proposed approach is evaluated in real- time with a testbed that consists of software defined radios (SDRs). Two devices with very different front-end characteristics are utilized as eavesdroppers to analyze hardware effects on the eavesdropping performance. As observed with experiments, robust secure regions can be created by the use of AN on eavesdroppers effectively.

Original languageEnglish
Title of host publication2017 IEEE Globecom Workshops, GC Wkshps 2017 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-7
Number of pages7
ISBN (Electronic)9781538639207
DOIs
Publication statusPublished - 2 Jul 2017
Event2017 IEEE Global Telecommunications Conference, GC 2017 - Singapore, Singapore
Duration: 4 Dec 20178 Dec 2017

Publication series

Name2017 IEEE Globecom Workshops, GC Wkshps 2017 - Proceedings
Volume2018-January

Conference

Conference2017 IEEE Global Telecommunications Conference, GC 2017
Country/TerritorySingapore
CitySingapore
Period4/12/178/12/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Funding

This work is supported by TUBITAK under Grant 115E827.

FundersFunder number
TUBITAK115E827

    Keywords

    • Artificial noise
    • Eavesdropper
    • Full-duplex
    • Physical layer security
    • Software defined radio

    Fingerprint

    Dive into the research topics of 'How effective is the artificial noise? Real-time analysis of a PHY security scenario'. Together they form a unique fingerprint.

    Cite this