Cyclic feature suppression for physical layer security
Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundan...
Ausführliche Beschreibung
Autor*in: |
Esat Ankaralı, Z. [verfasserIn] Arslan, Hüseyin [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
Enthalten in: Physical communication - Amsterdam [u.a.] : Elsevier, 2008, 25, Seite 588-597 |
---|---|
Übergeordnetes Werk: |
volume:25 ; pages:588-597 |
DOI / URN: |
10.1016/j.phycom.2016.09.003 |
---|
Katalog-ID: |
ELV000871664 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV000871664 | ||
003 | DE-627 | ||
005 | 20230524121956.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230427s2016 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.phycom.2016.09.003 |2 doi | |
035 | |a (DE-627)ELV000871664 | ||
035 | |a (ELSEVIER)S1874-4907(16)30128-8 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | 4 | |a 530 |a 620 |q DE-600 |
100 | 1 | |a Esat Ankaralı, Z. |e verfasserin |4 aut | |
245 | 1 | 0 | |a Cyclic feature suppression for physical layer security |
264 | 1 | |c 2016 | |
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. | ||
650 | 4 | |a Cyclostationarity | |
650 | 4 | |a Low probability of interception (LPI) | |
650 | 4 | |a OFDM | |
650 | 4 | |a Physical layer security | |
650 | 4 | |a SC-FDE | |
700 | 1 | |a Arslan, Hüseyin |e verfasserin |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Physical communication |d Amsterdam [u.a.] : Elsevier, 2008 |g 25, Seite 588-597 |h Online-Ressource |w (DE-627)573751552 |w (DE-600)2441929-1 |w (DE-576)294350721 |x 1876-3219 |7 nnns |
773 | 1 | 8 | |g volume:25 |g pages:588-597 |
912 | |a GBV_USEFLAG_U | ||
912 | |a SYSFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_101 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2004 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2008 | ||
912 | |a GBV_ILN_2011 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2038 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2048 | ||
912 | |a GBV_ILN_2049 | ||
912 | |a GBV_ILN_2050 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2056 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_2064 | ||
912 | |a GBV_ILN_2065 | ||
912 | |a GBV_ILN_2068 | ||
912 | |a GBV_ILN_2088 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2112 | ||
912 | |a GBV_ILN_2113 | ||
912 | |a GBV_ILN_2118 | ||
912 | |a GBV_ILN_2122 | ||
912 | |a GBV_ILN_2129 | ||
912 | |a GBV_ILN_2143 | ||
912 | |a GBV_ILN_2147 | ||
912 | |a GBV_ILN_2148 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2232 | ||
912 | |a GBV_ILN_2470 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_2522 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4046 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4242 | ||
912 | |a GBV_ILN_4251 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4333 | ||
912 | |a GBV_ILN_4334 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4393 | ||
951 | |a AR | ||
952 | |d 25 |h 588-597 |
author_variant |
a z e az aze h a ha |
---|---|
matchkey_str |
article:18763219:2016----::ylcetrsprsinopyial |
hierarchy_sort_str |
2016 |
publishDate |
2016 |
allfields |
10.1016/j.phycom.2016.09.003 doi (DE-627)ELV000871664 (ELSEVIER)S1874-4907(16)30128-8 DE-627 ger DE-627 rda eng 530 620 DE-600 Esat Ankaralı, Z. verfasserin aut Cyclic feature suppression for physical layer security 2016 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. Cyclostationarity Low probability of interception (LPI) OFDM Physical layer security SC-FDE Arslan, Hüseyin verfasserin aut Enthalten in Physical communication Amsterdam [u.a.] : Elsevier, 2008 25, Seite 588-597 Online-Ressource (DE-627)573751552 (DE-600)2441929-1 (DE-576)294350721 1876-3219 nnns volume:25 pages:588-597 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_224 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2008 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2088 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2118 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4393 AR 25 588-597 |
spelling |
10.1016/j.phycom.2016.09.003 doi (DE-627)ELV000871664 (ELSEVIER)S1874-4907(16)30128-8 DE-627 ger DE-627 rda eng 530 620 DE-600 Esat Ankaralı, Z. verfasserin aut Cyclic feature suppression for physical layer security 2016 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. Cyclostationarity Low probability of interception (LPI) OFDM Physical layer security SC-FDE Arslan, Hüseyin verfasserin aut Enthalten in Physical communication Amsterdam [u.a.] : Elsevier, 2008 25, Seite 588-597 Online-Ressource (DE-627)573751552 (DE-600)2441929-1 (DE-576)294350721 1876-3219 nnns volume:25 pages:588-597 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_224 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2008 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2088 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2118 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4393 AR 25 588-597 |
allfields_unstemmed |
10.1016/j.phycom.2016.09.003 doi (DE-627)ELV000871664 (ELSEVIER)S1874-4907(16)30128-8 DE-627 ger DE-627 rda eng 530 620 DE-600 Esat Ankaralı, Z. verfasserin aut Cyclic feature suppression for physical layer security 2016 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. Cyclostationarity Low probability of interception (LPI) OFDM Physical layer security SC-FDE Arslan, Hüseyin verfasserin aut Enthalten in Physical communication Amsterdam [u.a.] : Elsevier, 2008 25, Seite 588-597 Online-Ressource (DE-627)573751552 (DE-600)2441929-1 (DE-576)294350721 1876-3219 nnns volume:25 pages:588-597 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_224 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2008 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2088 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2118 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4393 AR 25 588-597 |
allfieldsGer |
10.1016/j.phycom.2016.09.003 doi (DE-627)ELV000871664 (ELSEVIER)S1874-4907(16)30128-8 DE-627 ger DE-627 rda eng 530 620 DE-600 Esat Ankaralı, Z. verfasserin aut Cyclic feature suppression for physical layer security 2016 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. Cyclostationarity Low probability of interception (LPI) OFDM Physical layer security SC-FDE Arslan, Hüseyin verfasserin aut Enthalten in Physical communication Amsterdam [u.a.] : Elsevier, 2008 25, Seite 588-597 Online-Ressource (DE-627)573751552 (DE-600)2441929-1 (DE-576)294350721 1876-3219 nnns volume:25 pages:588-597 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_224 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2008 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2088 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2118 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4393 AR 25 588-597 |
allfieldsSound |
10.1016/j.phycom.2016.09.003 doi (DE-627)ELV000871664 (ELSEVIER)S1874-4907(16)30128-8 DE-627 ger DE-627 rda eng 530 620 DE-600 Esat Ankaralı, Z. verfasserin aut Cyclic feature suppression for physical layer security 2016 nicht spezifiziert zzz rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. Cyclostationarity Low probability of interception (LPI) OFDM Physical layer security SC-FDE Arslan, Hüseyin verfasserin aut Enthalten in Physical communication Amsterdam [u.a.] : Elsevier, 2008 25, Seite 588-597 Online-Ressource (DE-627)573751552 (DE-600)2441929-1 (DE-576)294350721 1876-3219 nnns volume:25 pages:588-597 GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_224 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2008 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2088 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2118 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4393 AR 25 588-597 |
language |
English |
source |
Enthalten in Physical communication 25, Seite 588-597 volume:25 pages:588-597 |
sourceStr |
Enthalten in Physical communication 25, Seite 588-597 volume:25 pages:588-597 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Cyclostationarity Low probability of interception (LPI) OFDM Physical layer security SC-FDE |
dewey-raw |
530 |
isfreeaccess_bool |
false |
container_title |
Physical communication |
authorswithroles_txt_mv |
Esat Ankaralı, Z. @@aut@@ Arslan, Hüseyin @@aut@@ |
publishDateDaySort_date |
2016-01-01T00:00:00Z |
hierarchy_top_id |
573751552 |
dewey-sort |
3530 |
id |
ELV000871664 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV000871664</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230524121956.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230427s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.phycom.2016.09.003</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV000871664</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1874-4907(16)30128-8</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">530</subfield><subfield code="a">620</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Esat Ankaralı, Z.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyclic feature suppression for physical layer security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyclostationarity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Low probability of interception (LPI)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">OFDM</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Physical layer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SC-FDE</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arslan, Hüseyin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Physical communication</subfield><subfield code="d">Amsterdam [u.a.] : Elsevier, 2008</subfield><subfield code="g">25, Seite 588-597</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)573751552</subfield><subfield code="w">(DE-600)2441929-1</subfield><subfield code="w">(DE-576)294350721</subfield><subfield code="x">1876-3219</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:25</subfield><subfield code="g">pages:588-597</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">25</subfield><subfield code="h">588-597</subfield></datafield></record></collection>
|
author |
Esat Ankaralı, Z. |
spellingShingle |
Esat Ankaralı, Z. ddc 530 misc Cyclostationarity misc Low probability of interception (LPI) misc OFDM misc Physical layer security misc SC-FDE Cyclic feature suppression for physical layer security |
authorStr |
Esat Ankaralı, Z. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)573751552 |
format |
electronic Article |
dewey-ones |
530 - Physics 620 - Engineering & allied operations |
delete_txt_mv |
keep |
author_role |
aut aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1876-3219 |
topic_title |
530 620 DE-600 Cyclic feature suppression for physical layer security Cyclostationarity Low probability of interception (LPI) OFDM Physical layer security SC-FDE |
topic |
ddc 530 misc Cyclostationarity misc Low probability of interception (LPI) misc OFDM misc Physical layer security misc SC-FDE |
topic_unstemmed |
ddc 530 misc Cyclostationarity misc Low probability of interception (LPI) misc OFDM misc Physical layer security misc SC-FDE |
topic_browse |
ddc 530 misc Cyclostationarity misc Low probability of interception (LPI) misc OFDM misc Physical layer security misc SC-FDE |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Physical communication |
hierarchy_parent_id |
573751552 |
dewey-tens |
530 - Physics 620 - Engineering |
hierarchy_top_title |
Physical communication |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)573751552 (DE-600)2441929-1 (DE-576)294350721 |
title |
Cyclic feature suppression for physical layer security |
ctrlnum |
(DE-627)ELV000871664 (ELSEVIER)S1874-4907(16)30128-8 |
title_full |
Cyclic feature suppression for physical layer security |
author_sort |
Esat Ankaralı, Z. |
journal |
Physical communication |
journalStr |
Physical communication |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
500 - Science 600 - Technology |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
zzz |
container_start_page |
588 |
author_browse |
Esat Ankaralı, Z. Arslan, Hüseyin |
container_volume |
25 |
class |
530 620 DE-600 |
format_se |
Elektronische Aufsätze |
author-letter |
Esat Ankaralı, Z. |
doi_str_mv |
10.1016/j.phycom.2016.09.003 |
dewey-full |
530 620 |
author2-role |
verfasserin |
title_sort |
cyclic feature suppression for physical layer security |
title_auth |
Cyclic feature suppression for physical layer security |
abstract |
Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. |
abstractGer |
Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. |
abstract_unstemmed |
Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014. |
collection_details |
GBV_USEFLAG_U SYSFLAG_U GBV_ELV GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_32 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_105 GBV_ILN_110 GBV_ILN_150 GBV_ILN_151 GBV_ILN_187 GBV_ILN_224 GBV_ILN_370 GBV_ILN_602 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2008 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2034 GBV_ILN_2038 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2056 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2088 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2118 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2470 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4393 |
title_short |
Cyclic feature suppression for physical layer security |
remote_bool |
true |
author2 |
Arslan, Hüseyin |
author2Str |
Arslan, Hüseyin |
ppnlink |
573751552 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1016/j.phycom.2016.09.003 |
up_date |
2024-07-06T19:27:46.239Z |
_version_ |
1803859070800625664 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV000871664</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230524121956.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230427s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.phycom.2016.09.003</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV000871664</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S1874-4907(16)30128-8</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">530</subfield><subfield code="a">620</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Esat Ankaralı, Z.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyclic feature suppression for physical layer security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyclic prefix (CP) deploying techniques such as orthogonal frequency division multiplexing (OFDM) and single carrier frequency domain equalization (SC-FDE) offer considerable advantages in terms of equalizing time dispersive effect of wireless channel at the expense of a reasonable spectral redundancy. However, CP introduces cyclic features to the signal which can also be exploited for signal interception, blind parameter estimation and synchronization, and therefore, compromises the security of the signal against eavesdropping attacks. In order to provide a covert communication against such attacks, in this paper, we present two novel techniques that suppress the cyclic features of the CP utilizing signals while maintaining their advantages in equalization without reducing spectral efficiency. The first technique is built on a CP selection strategy while the second one is based on randomizing the symbol time. We also performed peak-to-average power ratio mitigation and out-of-band leakage suppression along with the cyclic feature concealing in the second technique at the expense of a reasonable complexity and signaling. Subsequent to the presentation of the proposed techniques, their performances are discussed and compared for OFDM and SC-FDE in terms of complexity and bit-error-rate along with cyclic feature suppression. 1 1 A part of this study is presented in IEEE Military Communication Conference (MILCOM), 2014.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyclostationarity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Low probability of interception (LPI)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">OFDM</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Physical layer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SC-FDE</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arslan, Hüseyin</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Physical communication</subfield><subfield code="d">Amsterdam [u.a.] : Elsevier, 2008</subfield><subfield code="g">25, Seite 588-597</subfield><subfield code="h">Online-Ressource</subfield><subfield code="w">(DE-627)573751552</subfield><subfield code="w">(DE-600)2441929-1</subfield><subfield code="w">(DE-576)294350721</subfield><subfield code="x">1876-3219</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:25</subfield><subfield code="g">pages:588-597</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2056</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">25</subfield><subfield code="h">588-597</subfield></datafield></record></collection>
|
score |
7.400613 |