How did you get here? PHY-layer path signatures

  • Loch A
  • Meier D
  • Hollick M
  • 4

    Readers

    Mendeley users who have this article in their library.
  • 1

    Citations

    Citations of this article.

Abstract

Security in wireless networks is in most cases established using conventional cryptography, which does not utilize the unique properties of the wireless domain. However, the wireless medium can provide domain-specific information to enhance existing security mechanisms and enable new security applications. Physical layer security provides such applications in single-hop scenarios, which means that it establishes security properties between two directly communicating wireless entities. This work extends existing physical layer security to enable its application to multihop networks. The proposed physical layer path signature mechanism enables the receiver of a message to validate that the message was relayed on a certain path through the network. To accomplish this, multiple protocols are proposed and implemented for testing in simulation and practice using a software defined radio platform. The proposed protocols are evaluated and compared in terms of performance and reliability. In this work, it is shown that the extension of physical layer security to create path signatures is possible, albeit limited to a maximum path length. This limitation is caused by the growing influence of noise and distortions with increasing path length.

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Authors

  • Adrian Loch

  • David Meier

  • Matthias Hollick

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free