Security and Reliability Performance of Noise-Loop Modulation: Theoretical Analysis and Experimentation
dc.authorid | CAPUTO, STEFANO/0000-0002-4516-8910 | |
dc.authorid | CAPUTO, STEFANO/0000-0002-4516-8910 | |
dc.authorid | MUCCHI, LORENZO/0000-0001-6389-0221 | |
dc.authorwosid | CAPUTO, STEFANO/ITT-0505-2023 | |
dc.authorwosid | RONGA, LUCA Simone/GQH-4004-2022 | |
dc.authorwosid | CAPUTO, STEFANO/AAT-2445-2021 | |
dc.contributor.author | Panayırcı, Erdal | |
dc.contributor.author | Caputo, Stefano | |
dc.contributor.author | Marcocci, Patrizio | |
dc.contributor.author | Chisci, Giovanni | |
dc.contributor.author | Ronga, Luca | |
dc.contributor.author | Panayırcı, Erdal | |
dc.date.accessioned | 2023-10-19T15:11:56Z | |
dc.date.available | 2023-10-19T15:11:56Z | |
dc.date.issued | 2022 | |
dc.department-temp | [Mucchi, Lorenzo; Caputo, Stefano; Marcocci, Patrizio] Univ Florence, Dept Informat Engn DINFO, I-50139 Florence, Italy; [Chisci, Giovanni] QUALCOMM R&D, San Diego, CA 92121 USA; [Ronga, Luca] LEONARDO SPA, Cyber Secur Grp, I-50013 Campi Bisenzio Florence, Italy; [Panayirci, Erdal] Kadir Has Univ, Dept Elect & Elect Engn, TR-34083 Istanbul, Turkey | en_US |
dc.description.abstract | Security is a crucial feature of current (5G) and even more for future (6G) communication networks. While the innate nature of the wireless channel is an issue for guaranteeing security, its physical characteristics can be exploited for protecting confidential data. Physical-layer Security (PLS) mechanisms take advantage of unique features of the transmission media or of the user equipment to introduce an additional level of data protection. The physical-layer security (PLS) can be seen as the first level of defense. The noise-loop (NL) modulation is a PLS technique that intrinsically provides confidentiality. In this paper, we first provide the theoretical analysis to evaluate the reliability and security in multipath fading channels, and then the theoretical results are evaluated by experimentation. A Software Defined Radio (SDR) testbed that exploits the NL secure modulation was implemented and a measurement campaign has been carried out in an indoor environment, with passive and active malicious nodes. An evaluation of the complexity of the proposed system is also reported, showing that the NL has low hardware resource occupancy and low computational cost. These fundamental characteristics make the NL modulation a valid PLS technique for providing a security solution for beyond 5G and 6G networks. | en_US |
dc.description.sponsorship | European Telecommunications Standards Institute (ETSI) SmartBAN; European Union [872752]; Italian Ministry of Defense underMilitary Research National Program [10061] | en_US |
dc.description.sponsorship | This work was supported in part by European Telecommunications Standards Institute (ETSI) SmartBAN, in part by European Union's Horizon 2020 Research and Innovation Programme under Grant 872752, and in part by the Italian Ministry of Defense underMilitary Research National Program under Grant 10061. The review of this article was coordinated by Prof. XianbinWang. | en_US |
dc.identifier.citationcount | 3 | |
dc.identifier.doi | 10.1109/TVT.2022.3160094 | en_US |
dc.identifier.endpage | 6350 | en_US |
dc.identifier.issn | 0018-9545 | |
dc.identifier.issn | 1939-9359 | |
dc.identifier.issue | 6 | en_US |
dc.identifier.scopus | 2-s2.0-85127029065 | en_US |
dc.identifier.scopusquality | Q1 | |
dc.identifier.startpage | 6335 | en_US |
dc.identifier.uri | https://doi.org/10.1109/TVT.2022.3160094 | |
dc.identifier.uri | https://hdl.handle.net/20.500.12469/5282 | |
dc.identifier.volume | 71 | en_US |
dc.identifier.wos | WOS:000815676900055 | en_US |
dc.identifier.wosquality | Q1 | |
dc.khas | 20231019-WoS | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE-Inst Electrical Electronics Engineers Inc | en_US |
dc.relation.ispartof | Ieee Transactions on Vehicular Technology | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.scopus.citedbyCount | 12 | |
dc.subject | Physical-Layer Security | En_Us |
dc.subject | Artificial-Noise | En_Us |
dc.subject | Power Allocation | En_Us |
dc.subject | Key Generation | En_Us |
dc.subject | Channel | En_Us |
dc.subject | Transmission | En_Us |
dc.subject | Capacity | En_Us |
dc.subject | Security | en_US |
dc.subject | Design | En_Us |
dc.subject | Jamming | en_US |
dc.subject | MIMO communication | en_US |
dc.subject | Physical-Layer Security | |
dc.subject | Peer-to-peer computing | en_US |
dc.subject | Artificial-Noise | |
dc.subject | Precoding | en_US |
dc.subject | Power Allocation | |
dc.subject | Communication system security | en_US |
dc.subject | Key Generation | |
dc.subject | Array signal processing | en_US |
dc.subject | Channel | |
dc.subject | Confidentiality | en_US |
dc.subject | Transmission | |
dc.subject | physical-layer security | en_US |
dc.subject | Capacity | |
dc.subject | noise injection | en_US |
dc.subject | Design | |
dc.subject | 6G | en_US |
dc.title | Security and Reliability Performance of Noise-Loop Modulation: Theoretical Analysis and Experimentation | en_US |
dc.type | Article | en_US |
dc.wos.citedbyCount | 9 | |
dspace.entity.type | Publication | |
relation.isAuthorOfPublication | 5371ab5d-9cd9-4d1f-8681-a65b3d5d6add | |
relation.isAuthorOfPublication.latestForDiscovery | 5371ab5d-9cd9-4d1f-8681-a65b3d5d6add |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 5282.pdf
- Size:
- 2.9 MB
- Format:
- Adobe Portable Document Format
- Description:
- Tam Metin / Full Text