Visible to the public Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation

TitleCross MAC/PHY layer security design using ARQ with MRC and adaptive modulation
Publication TypeConference Paper
Year of Publication2016
AuthorsHamamreh, J. M., Yusuf, M., Baykas, T., Arslan, H.
Conference Name2016 IEEE Wireless Communications and Networking Conference
Date PublishedApril 2016
PublisherIEEE
ISBN Number978-1-4673-9814-5
Keywordsadaptive modulation, ARQ, Automatic repeat request, composability, Cross Layer Security, cross MAC-PHY layer security design, Decoding, diversity reception, fading channels, maximal ratio combination, Measurement, modulation, MRC, packet error rate formula, PER formula, physical-MAC layer security design, pubcrawl, quality of service, Rayleigh channels, Rayleigh fading channel, Receivers, Resiliency, security, security performance, telecommunication security, Wireless communication, wireless service confidentiality
Abstract

In this work, Automatic-Repeat-Request (ARQ) and Maximal Ratio Combination (MRC), have been jointly exploited to enhance the confidentiality of wireless services requested by a legitimate user (Bob) against an eavesdropper (Eve). The obtained security performance is analyzed using Packet Error Rate (PER), where the exact PER gap between Bob and Eve is determined. PER is proposed as a new practical security metric in cross layers (Physical/MAC) security design since it reflects the influence of upper layers mechanisms, and it can be linked with Quality of Service (QoS) requirements for various digital services such as voice and video. Exact PER formulas for both Eve and Bob in i.i.d Rayleigh fading channel are derived. The simulation and theoretical results show that the employment of ARQ mechanism and MRC on a signal level basis before demodulation can significantly enhance data security for certain services at specific SNRs. However, to increase and ensure the security of a specific service at any SNR, adaptive modulation is proposed to be used along with the aforementioned scheme. Analytical and simulation studies demonstrate orders of magnitude difference in PER performance between eavesdroppers and intended receivers.

URLhttps://ieeexplore.ieee.org/document/7564987
DOI10.1109/WCNC.2016.7564987
Citation Keyhamamreh_cross_2016