Channel Randomness-Based Adaptive Cyclic Prefix Selection for Secure OFDM System


Naderi S., Costa D. B. D., ARSLAN H.

IEEE Wireless Communications Letters, cilt.11, sa.6, ss.1220-1224, 2022 (SCI-Expanded) identifier identifier

  • Yayın Türü: Makale / Tam Makale
  • Cilt numarası: 11 Sayı: 6
  • Basım Tarihi: 2022
  • Doi Numarası: 10.1109/lwc.2022.3161397
  • Dergi Adı: IEEE Wireless Communications Letters
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Compendex, INSPEC
  • Sayfa Sayıları: ss.1220-1224
  • Anahtar Kelimeler: OFDM, Synchronization, Quantization (signal), Security, Bit error rate, Wireless communication, Communication system security, Channel randomness-dependent cyclic prefix selection, correlated eavesdropper, OFDM, physical layer security, secure adaptive cyclic prefix length, TDD
  • İstanbul Medipol Üniversitesi Adresli: Evet

Özet

A novel method for cyclic prefix (CP) adaptation based on wireless channel randomness is proposed for orthogonal frequency-division multiplexing (OFDM) systems in urban areas. Especially, a quantization algorithm and an adaptive window-based strong subcarriers selection are designed on the sorted channel frequency response of the legitimate party to select randomly the secure CP (SCP) length for each OFDM symbol without the need to share any information between legitimate nodes. The proposed method creates a problem for illegitimate user's synchronization as it does not have any information about SCP length for every OFDM symbol, even if it uses blind synchronization techniques. The effectiveness of the proposed mechanism is evaluated through representative metrics, such as bit error rate (BER), throughput in both perfect and imperfect channel estimation scenarios, mismatch probability (MP), and cyclic autocorrelation function (CAF). Also, the performance for the presence of a correlated eavesdropper (Eve) in the system is evaluated. Simulation results show a huge secrecy gap between BER and throughput performance of legitimate and illegitimate users in all scenarios.