Professional Documents
Culture Documents
ABSTRACT
TX1
0.9
N=6
N=5 N=7
0.8
0.7
0.5
N=3
0.4
N=2
0.3
0.2
0.1
0
0 50 100 150 200 250 300 350 400 450 500
L
Fig.4 Performance curves for given scenario Fig.5 Probabilities of total security for various N and L
3.2 Probability of security the proposed TranSec layer offers security with probability 1
As explained before, the security layer is based on the (total security) for these 2N symbols. Following 2N symbols
reception of a deteriorated signal by the eavesdropper. The the eavesdropper has some probability of receiving all
deterioration of the signal is due to four factors: possible joint symbols and the probability for security
decreases as more joint symbols are received by the
1. The eavesdropper would have difficulty knowing the eavesdropper. It follows that in order to achieve total
expected joint symbol constellation at its MF output, since it security:
has no knowledge of the channel compensation done at each
2 N Ts Tstat . (8)
transmitter, and no prior knowledge of the CSI from the nodes
to itself. Tstat is proportional to 1 B d , where B d is the Doppler
2. The signals from the group nodes would not reach the spread. It is commonly assumed that Tstat = 0.1 B d .
eavesdropper simultaneously. The minimal number of nodes for total security is:
3. The decoding complexity of the eavesdropper would be
N TS = log 2 (Tstat TS ) . (9)
much higher than that of RX. This is due to the fact that for
each channel instance the eavesdroppers' joint constellation As an example, for TS = 4 sec and B d = 100 Hz we have:
would change, making it impossible to design a constant and NTS = 8 .
computational efficient decoding algorithm. The RX decoding For some values of Tstat and Ts , the required N TS for
algorithm would be constant because each channel instance is
total security might be to big for a system at hand, so we
compensated for. This means that online decoding by the
analyze the effect on security when N < N TS .
eavesdropper is much more complex than at RX.
4. The joint constellation formed at the eavesdropper MF The probability for total security after receiving the first L
output is not optimal, since it was made to be optimal at a symbols PTS (L ) is defined as the probability that an
different point in space that of RX. eavesdropper does not receive all typed of joint symbols from
these L symbols. For L < 2 N , PTS (L ) = 1 , for L 2 N the
Factors 2,3 might be compromised based on the assumptions
of eavesdropper proximity to receiver and infinite online probability PTS (L ) corresponds to the dice problem
computation power. However, dismissing factor 1 requires that formulated in [11 pg. 8]:
the eavesdropper finds some means to discover its received 2 N 1 N N
L
( 1) j +1 2 2 j
joint constellation structure. The best case scenario for an
eavesdropper is to deduce its received joint constellation based
PTS ( L ) = j 2 N
(10)
j =1
on samples taken from the noisy channel. This in itself is a
Fig.5 displays this probability for various N and L . Notice
problem for the eavesdropper, but for the sake of argument we
assume that blind estimation is possible without error. that PTS (L ) is a non-increasing function of L and that
However, any blind estimation by the eavesdropper would when PTS (L ) decreases it decreases slower for larger N .
have to rely on receiving at least one joint symbol of all joint This means that as N increases total security is compromised
symbol types. Since there are 2N joint symbols the less. If for example we tolerate PTS (L ) > 0.99 , we obtain
eavesdropper remains blind for at least the first 2N symbols
duration of each node following a receiver pilot. It follows that such a security level for L LTS secure symbols as is shown
in Tab.1, which was derived from Fig.5. Note that LTS