Paper
11 October 2023 Physical layer security verification system based on software defined radio
Yonghuang Liu, Huanhuan Song, Hong Wen, Ziyang Yu, Wen Li
Author Affiliations +
Proceedings Volume 12918, Fourth International Conference on Computer Science and Communication Technology (ICCSCT 2023); 129180S (2023) https://doi.org/10.1117/12.3009309
Event: International Conference on Computer Science and Communication Technology (ICCSCT 2023), 2023, Wuhan, China
Abstract
Compared with traditional encryption technology, physical layer security technology uses channel noise to realize the key with the same length as plaintext. Even if the eavesdropper has strong cracking computing power, it cannot decipher the confidential data without the key, which can truly realize “One-Time-Pad” and ensure the security of wireless communication. In this paper, we propose a physical layer security verification system based on software defined radio. In the system, base stations and legitimate users can obtain channel information efficiently, and eavesdroppers can use the powerful storage and computing resources of the cloud server to decrypt confidential signals without time constraints. Based on the system, this paper designs and verifies the physical layer security scheme with joint precoding and Artificial Noise, which fills the gap of the prototype verification platform of information-theoretic security and provides strong support for verifying the unconditional security features of the physical layer security technology.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Yonghuang Liu, Huanhuan Song, Hong Wen, Ziyang Yu, and Wen Li "Physical layer security verification system based on software defined radio", Proc. SPIE 12918, Fourth International Conference on Computer Science and Communication Technology (ICCSCT 2023), 129180S (11 October 2023); https://doi.org/10.1117/12.3009309
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Network security

Antennas

Interference (communication)

Matrices

Clouds

Security technologies

Back to Top