Reverse piloting protocol for securing time varying wireless channels

Gill R. Tsouri, Dov Wulich

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

We consider single-tone pilot based burst transmission over slow time varying flat fading wireless channels with no line of sight. We propose a reverse pilot signaling protocol, based on sending the pilot signal from the receiver to the transmitter instead of from the transmitter to the receiver and on channel tracking at the receiver. We show that the channel performs automatic symbol level encryption analogous to a shift cipher. We derive explicit relationships between channel and system parameters which guarantee secure transmission of the entire data burst for given channel conditions, and depict them for Rayleigh fading. The proposed protocol exhibits high key generating rates, and no overheads on key distribution, enciphering and deciphering. Its security strength increases with mobility. These properties make it a good candidate for mobile wireless systems where bandwidth and power resources are scarce, such as mobile wireless sensor networks and mobile ad-hoc networks.

Original languageEnglish
Title of host publication7th Annual Wireless Telecommunications Symposium, WTS 2008
PublisherInstitute of Electrical and Electronics Engineers
Pages125-131
Number of pages7
ISBN (Print)9781424418701
DOIs
StatePublished - 1 Jan 2008
Event7th Annual Wireless Telecommunications Symposium, WTS 2008 - Ponoma, CA, United States
Duration: 24 Apr 200826 Apr 2008

Publication series

Name7th Annual Wireless Telecommunications Symposium, WTS 2008

Conference

Conference7th Annual Wireless Telecommunications Symposium, WTS 2008
Country/TerritoryUnited States
CityPonoma, CA
Period24/04/0826/04/08

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'Reverse piloting protocol for securing time varying wireless channels'. Together they form a unique fingerprint.

Cite this