Title :
Artificial intersymbol interference (ISI) to exploit receiver imperfections for secrecy
Author :
Sheikholeslami, Ali ; Goeckel, Dennis ; Pishro-Nik, Hossein
Author_Institution :
Electr. & Comput. Eng. Dept., Univ. of Massachusetts, Amherst, MA, USA
Abstract :
Secure communication over a wireless channel in the presence of a passive eavesdropper is considered. We present a method to exploit the eavesdropper´s inherent receiver vulnerabilities to obtain everlasting secrecy. An ephemeral cryptographic key is pre-shared between the transmitter and the legitimate receiver and is utilized to induce intentional intersymbol interference (ISI). The legitimate receiver uses the key to cancel the ISI while the eavesdropper, since it does not have the key, cannot do such. It is shown that although ISI reduces the capacity of the main channel, it can lead to a net gain in secrecy rate. The achievable secrecy rates for different ISI filter settings are evaluated and the proposed method is compared with other information-theoretic security schemes.
Keywords :
channel capacity; cryptography; intersymbol interference; radio receivers; telecommunication security; wireless channels; ISI filter settings; artificial intersymbol interference; channel capacity; ephemeral cryptographic key; in secrecy rate; information-theoretic security schemes; legitimate receiver; net gain; passive eavesdropper; receiver imperfections; receiver vulnerability; secure communication; transmitter; wireless channel; Cryptography; Information theory; Receivers; Signal to noise ratio; Transmitters;
Conference_Titel :
Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on
Conference_Location :
Istanbul
DOI :
10.1109/ISIT.2013.6620766