TY - JOUR
T1 - Wireless information-theoretic security in an outdoor topology with obstacles
T2 - Theoretical analysis and experimental measurements
AU - Chrysikos, Theofilos
AU - Dagiuklas, Tasos
AU - Kotsopoulos, Stavros
PY - 2011
Y1 - 2011
N2 - This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. An autonomic network of moving users was implemented via 802.11n nodes of an ad hoc network for an outdoor topology with obstacles. Obstructed-Line-of-Sight (OLOS) and Non-Line-of-Sight (NLOS) propagation scenarios were examined. Low-speed user movement was considered, so that Doppler spread could be discarded. A transmitter and a legitimate receiver exchanged information in the presence of a moving eavesdropper. Average Signal-to-Noise Ratio (SNR) values were acquired for both the main and the wiretap channel, and the Probability of Nonzero Secrecy Capacity was calculated based on theoretical formula. Experimental results validate theoretical findings stressing the importance of user location and mobility schemes on the robustness of Wireless Information-Theoretic Security and call for further theoretical analysis.
AB - This paper presents a Wireless Information-Theoretic Security (WITS) scheme, which has been recently introduced as a robust physical layer-based security solution, especially for infrastructureless networks. An autonomic network of moving users was implemented via 802.11n nodes of an ad hoc network for an outdoor topology with obstacles. Obstructed-Line-of-Sight (OLOS) and Non-Line-of-Sight (NLOS) propagation scenarios were examined. Low-speed user movement was considered, so that Doppler spread could be discarded. A transmitter and a legitimate receiver exchanged information in the presence of a moving eavesdropper. Average Signal-to-Noise Ratio (SNR) values were acquired for both the main and the wiretap channel, and the Probability of Nonzero Secrecy Capacity was calculated based on theoretical formula. Experimental results validate theoretical findings stressing the importance of user location and mobility schemes on the robustness of Wireless Information-Theoretic Security and call for further theoretical analysis.
UR - http://www.scopus.com/inward/record.url?scp=78249231726&partnerID=8YFLogxK
U2 - 10.1155/2011/628747
DO - 10.1155/2011/628747
M3 - Article
AN - SCOPUS:78249231726
SN - 1687-1472
VL - 2011
JO - Eurasip Journal on Wireless Communications and Networking
JF - Eurasip Journal on Wireless Communications and Networking
M1 - 628747
ER -