TY - GEN
T1 - Demo abstract
T2 - 2018 IEEE Conference on Computer Communications Workshops, INFOCOM 2018
AU - Fan, Xiaoran
AU - Zhang, Zhijie
AU - Trappe, Wade
AU - Zhang, Yanyong
AU - Howard, Rich
AU - Han, Zhu
PY - 2018/7/6
Y1 - 2018/7/6
N2 - Ensuring confidentiality of communication is fundamental to securing the operation of a wireless system, where eavesdropping is easily facilitated by the broadcast nature of the wireless medium. By applying distributed phase alignment among distributed transmitters, we show that a new approach for assuring physical layer secrecy, without requiring any knowledge about the eavesdropper or injecting any additional cover noise, is possible if the transmitters frequently perturb their phases around the proper alignment phase while transmitting messages. This approach is readily applied to amplitude-based modulation schemes, such as PAM or QAM. We present our secrecy mechanisms, prove several important secrecy properties, and develop a practical secret communication system design. We further implement and deploy a prototype that consists of 16 distributed transmitters using USRP N210s in a 20 × 20 × 3 m3 area. By sending more than 160M bits over our system to the receiver, depending on system parameter settings, we measure that the eavesdroppers failed to decode 30% - 60% of the bits cross multiple locations while the intended receiver has an estimated bit error ratio of 3 × 10-6.
AB - Ensuring confidentiality of communication is fundamental to securing the operation of a wireless system, where eavesdropping is easily facilitated by the broadcast nature of the wireless medium. By applying distributed phase alignment among distributed transmitters, we show that a new approach for assuring physical layer secrecy, without requiring any knowledge about the eavesdropper or injecting any additional cover noise, is possible if the transmitters frequently perturb their phases around the proper alignment phase while transmitting messages. This approach is readily applied to amplitude-based modulation schemes, such as PAM or QAM. We present our secrecy mechanisms, prove several important secrecy properties, and develop a practical secret communication system design. We further implement and deploy a prototype that consists of 16 distributed transmitters using USRP N210s in a 20 × 20 × 3 m3 area. By sending more than 160M bits over our system to the receiver, depending on system parameter settings, we measure that the eavesdroppers failed to decode 30% - 60% of the bits cross multiple locations while the intended receiver has an estimated bit error ratio of 3 × 10-6.
UR - http://www.scopus.com/inward/record.url?scp=85050668209&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85050668209&partnerID=8YFLogxK
U2 - 10.1109/INFCOMW.2018.8406874
DO - 10.1109/INFCOMW.2018.8406874
M3 - Conference contribution
AN - SCOPUS:85050668209
T3 - INFOCOM 2018 - IEEE Conference on Computer Communications Workshops
SP - 1
EP - 2
BT - INFOCOM 2018 - IEEE Conference on Computer Communications Workshops
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 15 April 2018 through 19 April 2018
ER -