A Practical Implementation of Physical Layer Security in Wireless Networks

Sayed Amir Hoseini, Faycal Bouhafs, Frank Den Hartog

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

16 Citations (Scopus)

Abstract

Physical Layer Security (PLS) is widely recognized as a promising approach to secure wireless communications through the exploitation of the physical properties of the wireless channel. However, until today, PLS has mostly been a concept from information theory without practical implementations. In this paper, we present an actual implementation of PLS in a wireless network. We achieved this by leveraging the flexibility and control granularity offered by the relatively new concept of spectrum programming, by which we were able to control and degrade the quality of the eavesdropper's channel by virtually manipulating the connectivity of the legitimate station. The key feature of our design is that we make intelligent use of the architecture of a wireless network instead of trying to control every link individually on the physical layer. The PLS implementation is built using off-the-shelf hardware and open-source software which makes it cost-effective and easy to replicate.

Original languageEnglish
Title of host publication2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC)
EditorsMarco Di Felice, Bang Chui Jung, Claudio E Casetti
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages240-243
Number of pages4
ISBN (Print)9781665431613
DOIs
Publication statusPublished - 2022
Externally publishedYes
Event19th IEEE Annual Consumer Communications and Networking Conference, CCNC 2022 - Virtual, Online, United States
Duration: 8 Jan 202211 Jan 2022

Publication series

NameProceedings - IEEE Consumer Communications and Networking Conference, CCNC
ISSN (Print)2331-9860

Conference

Conference19th IEEE Annual Consumer Communications and Networking Conference, CCNC 2022
Country/TerritoryUnited States
CityVirtual, Online
Period8/01/2211/01/22

Fingerprint

Dive into the research topics of 'A Practical Implementation of Physical Layer Security in Wireless Networks'. Together they form a unique fingerprint.

Cite this