GET THE APP

A MIMO optimization for physical layer security
..

International Journal of Sensor Networks and Data Communications

ISSN: 2090-4886

Open Access

A MIMO optimization for physical layer security


2nd International Conference and Business Expo on Wireless & Telecommunication

April 21-22, 2016 Dubai, UAE

Mario Marques da Silva

Universidade Autonoma de Lisboa, Lisbon

Scientific Tracks Abstracts: Sensor Netw Data Commun

Abstract :

The use of multiple antennas at both the transmitter and receiver aims to improve performance or to increase symbol rate of systems, but it usually requires higher implementation complexity. Multiple Input Multiple Output (MIMO) architectures can be used for combined transmit and receive diversity, for the parallel transmission of data or spatial multiplexing. When used for spatial multiplexing, MIMO technology promises high bit rates in a narrow bandwidth. Therefore, it is of high significance to spectrum users. In this case, MIMO system considers the transmission of different signals from each transmit element so that the receiving antenna array receives a superposition of all transmitted signals. Mobile communication systems must support multiple users achieving at the same time privacy of users contents. Security common solutions are based on encrypted algorithms from higher layers, such as private and public encrypted keys. Other possibility is to implement physical layer security schemes. One advantage of physical layer security relies on their ability to be combined with other security schemes from higher layers. Due to the broadcast nature of MIMO systems, security is a critical issue. However, the constellation shaping on the desired direction introduced by a new proposed transmitter means that we have directivity at the transmitted constellation that can be employed to assure security at physical layer. Privacy is achieved since each user must know the set of coefficients associated to each BPSK component as well as the array configuration; otherwise receives useless data. Therefore, the inherent security lies on the constellation directivity, i.e., the direction in which the constellation is optimized, which can be improved by changes on coefficients├ó┬?┬? phases or using constellations that are decomposed with a higher number of BPSK components. The several cases analyzed in this speech show effectiveness of the proposed approach to implement a security scheme at physical layer level.

Biography :

Mário Marques da Silva is an Associate Professor and the Director of the Department of Sciences and Technologies at Universidade Autónoma de Lisboa. He is also a Researcher at Instituto de Telecomunicações, in Lisbon, Portugal. He received his BSc in Electrical Engineering in 1992, and the MSc and PhD degrees in Electrical and Computers Engineering (Telecommunications), respectively in 1999 and 2005, both from Instituto Superior Técnico, University of Lisbon. Between 2005 and 2008, he was with NATO Air Command Control & Management Agency (NACMA) in Brussels (Belgium), where he managed the deployable communications of the new Air Command and Control System Program. He has been involved in multiple networking and telecommunications projects. He is the author of four CRC Press books and of several dozens of journal and conference papers, a member of IEEE and AFCEA, and reviewer for a number of international scientific IEEE journals and conferences. Finally, he has chaired many conference sessions and has been serving in the organizing committee of relevant EURASIP and IEEE conferences.

Email: marques.silva@zonmail.pt

Google Scholar citation report
Citations: 343

International Journal of Sensor Networks and Data Communications received 343 citations as per Google Scholar report

International Journal of Sensor Networks and Data Communications peer review process verified at publons

Indexed In

 
arrow_upward arrow_upward