{"title":"MIMO Cross-Layer Secure Communication Architecture Based on STBC","authors":"H. Wen, G. Gong, P. Ho","doi":"10.1109/GLOCOM.2010.5684012","DOIUrl":null,"url":null,"abstract":"The wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. The security has become a critical concern in the physical layer of wireless networks. In this work, we present a cross-layer security scheme for STBC system. By introducing a distort signal set the sender randomly flip-flops between the distort signal set and the orthogonal code set to confuse the attacker. The physicallayer security is enhanced as a result. In the proposed scheme the physical-layer may rely on upper-layer encryption techniques for security, which results in a cross-layer security scheme.","PeriodicalId":6448,"journal":{"name":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","volume":"34 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Global Telecommunications Conference GLOBECOM 2010","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.2010.5684012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The wireless networks lack a physical boundary due to the broadcasting nature of wireless transmissions. The security has become a critical concern in the physical layer of wireless networks. In this work, we present a cross-layer security scheme for STBC system. By introducing a distort signal set the sender randomly flip-flops between the distort signal set and the orthogonal code set to confuse the attacker. The physicallayer security is enhanced as a result. In the proposed scheme the physical-layer may rely on upper-layer encryption techniques for security, which results in a cross-layer security scheme.