Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers
Publication

Publications

Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers

Title
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers
Type
Article in International Scientific Journal
Year
2018
Authors
Sá Sousa, J
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
João P. Vilela
(Author)
Other
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Journal
Vol. 13
Pages: 143-155
ISSN: 1556-6013
Publisher: IEEE
Other information
Authenticus ID: P-00N-ZBA
Abstract (EN): Current physical-layer security techniques typically rely on a degraded eavesdropper, thus warranting some sort of advantage that can be relied upon to achieve higher levels of security. We consider instead non-degraded eavesdroppers that possess equal or better capabilities than legitimate receivers. Under this challenging setup, most of the current physical-layer security techniques become hard to administer and new dimensions to establish advantageous periods of communication are needed. For that, we consider employing a spread spectrum uncoordinated frequency hopping (UFH) scheme aided by friendly jammers for improved secrecy. We characterize the secrecy level of this spread spectrum scheme, by devising a stochastic geometry mathematical model to assess the secure packet throughput (probability of secure communication) of devices operating under UFH that accommodates the impact of friendly jammers. We further implement and evaluate these techniques in a real-world test-bed of software-defined radios. Results show that although UFH with jamming leads to low secure packet throughput values, by exploiting frequency diversity, these methods may be used for establishing secret keys. We propose a method for secret-key establishment that builds on the advantage provided by UFH and jamming to establish secret keys, notably against non-degraded adversary eavesdroppers that may appear in advantageous situations. © 2005-2012 IEEE.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 13
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Wireless Secrecy Regions With Friendly Jamming (2011)
Article in International Scientific Journal
J. P. Vilela; M. Bloch; J. Barros; S. W. McLaughlin
Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion (2012)
Article in International Scientific Journal
P. Pinto; J. Barros; M. Win
Secure Communication in Stochastic Wireless Networks - Part I: Connectivity (2012)
Article in International Scientific Journal
P. Pinto; J. Barros; M. Win
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes (2014)
Article in International Scientific Journal
Baldi, M; Chiaraluce, F; Laurenti, N; Tomasin, S; Renna, F
Position-Based Jamming for Enhanced Wireless Secrecy (2011)
Article in International Scientific Journal
J. P. Vilela; Pedro Pinto; J. Barros

See all (11)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-07 at 23:37:02 | Privacy Policy | Personal Data Protection Policy | Whistleblowing