TY - GEN
T1 - Static and Dynamic Finite Constellation Decomposition for Wireless Physical Layer Security
AU - Tasci, Eyyup
AU - Tan, Arman
AU - Zirtiloglu, Timur
AU - Koca, Mutlu
AU - Shlezinger, Nir
AU - Yazicigil, Rabia Tugce
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025/1/1
Y1 - 2025/1/1
N2 - Security is a critical element in the design of communication systems. However, despite its essential role in enabling low-cost implementations and robust theoretical foundations, physical layer security is often overlooked in developing countermeasures against eavesdropping. In this work, we propose practical physical-layer countermeasures that enhance secrecy with low computational overhead. Our approach decomposes the constellation diagram using basis vectors, constructing the original message symbol in the main lobe aimed at the intended receiver, while projecting randomized constellation points in other directions to mislead potential eavesdroppers. When the eavesdropper's location is known, we use static basis vectors, achieving a higher level of secrecy in that direction. When the location is unknown, we dynamically change the basis vectors to provide information-theoretic security in all directions through basis vector randomization. This design enables the intended receiver to operate without knowledge of the basis vectors, reducing receiver overhead. We evaluate the scheme's secrecy performance through bit error rate and secrecy rate analyses, demonstrating its potential to improve physical layer security.
AB - Security is a critical element in the design of communication systems. However, despite its essential role in enabling low-cost implementations and robust theoretical foundations, physical layer security is often overlooked in developing countermeasures against eavesdropping. In this work, we propose practical physical-layer countermeasures that enhance secrecy with low computational overhead. Our approach decomposes the constellation diagram using basis vectors, constructing the original message symbol in the main lobe aimed at the intended receiver, while projecting randomized constellation points in other directions to mislead potential eavesdroppers. When the eavesdropper's location is known, we use static basis vectors, achieving a higher level of secrecy in that direction. When the location is unknown, we dynamically change the basis vectors to provide information-theoretic security in all directions through basis vector randomization. This design enables the intended receiver to operate without knowledge of the basis vectors, reducing receiver overhead. We evaluate the scheme's secrecy performance through bit error rate and secrecy rate analyses, demonstrating its potential to improve physical layer security.
UR - https://www.scopus.com/pages/publications/105018070430
U2 - 10.1109/ICCWorkshops67674.2025.11162481
DO - 10.1109/ICCWorkshops67674.2025.11162481
M3 - Conference contribution
AN - SCOPUS:105018070430
T3 - 2025 IEEE International Conference on Communications Workshops, ICC Workshops 2025
SP - 2113
EP - 2119
BT - 2025 IEEE International Conference on Communications Workshops, ICC Workshops 2025
A2 - Valenti, Matthew
A2 - Reed, David
A2 - Torres, Melissa
PB - Institute of Electrical and Electronics Engineers
T2 - 2025 IEEE International Conference on Communications Workshops, ICC Workshops 2025
Y2 - 8 June 2025 through 12 June 2025
ER -