Jamming Based on an Ephemeral Key to Obtain Everlasting Security in Wireless Environments


Secure Communication over a wiretap channel is taken into account within the disadvantaged wireless environment, where the eavesdropper channel is (possibly a lot of) better than the most channel. We gift a technique to take advantage of inherent vulnerabilities of the eavesdroppers receiver to get everlasting secrecy. Primarily based on an ephemeral cryptographic key pre-shared between the transmitter Alice and the intended recipient Bob, a random jamming signal is added to each symbol. Bob can subtract the jamming signal before recording the signal, while the eavesdropper Eve is forced to perform these non-commutative operations in the opposite order. Thus, info-theoretic secrecy will be obtained, hence achieving the goal of changing the vulnerable “cheap” cryptographic secret key bits into “valuable” info-theoretic (i.e., everlasting) secure bits. We tend to evaluate the achievable secrecy rates for different settings, and show that, even when the eavesdropper has good access to the output of the transmitter (albeit through an imperfect analog-to-digital converter), the strategy will still achieve a positive secrecy rate. Next we tend to think about a wideband system, where Alice and Bob perform frequency hopping additionally to adding the random jamming to the signal, and we show the utility of such an approach even in the face of substantial eavesdropper hardware capabilities.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Swift Jamming Attack on Frequency Offset Estimation: The Achilles’ Heel of OFDM SystemsABSTRACT:Frequency offset (FO) refers to the distinction within the operating frequencies of two radio oscillators. Failure
PROJECT TITLE :Jamming Resilient Communication Using MIMO Interference CancellationABSTRACT:Jamming attack is a serious threat to the wireless communications. Reactive jamming maximizes the attack efficiency by jamming only when
PROJECT TITLE :Critical communications and public safety networks, part 2: technical issues, security, and applications [Guest Editorial]ABSTRACT:As we tend to mentioned in the Guest Editorial of Part 1 of this Feature Topic,
PROJECT TITLE :Robust Joint Beamforming and Jamming for Secure AF Networks: Low-Complexity DesignABSTRACT:This paper investigates the physical-layer security issue of an amplify-and-forward (AF) relay network. We have a tendency
PROJECT TITLE :Analysis of Rotating Cross-Eye JammingABSTRACT:To find a higher rotating retrodirective cross-eye jamming system, a replacement scenario is presented, that consists of 4 retrodirective jamming parts. A brand new

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry