Physical layer security using boundary technique for emerging wireless communication systems
Ismaeel Abiodun Sikiru,Lukman Abiodun Olawoyin,Nasir Faruk,Abdulkarim Ayopo Oloyede,Abubakar Abdulkarim,Imam‐Fulani Yusuf Olayinka,Olugbenga Akinkunmi Sowande,Salisu Garba,Agbotiname Lucky Imoize
DOI: https://doi.org/10.1002/spy2.288
2022-12-13
Security and Privacy
Abstract:The broadcast nature of radio propagation in wireless communication has been suspected as the loopholes of passive or active attacks by unauthorized users (eavesdroppers). The physical layer security techniques operate at the lowest stack of OSI layer against conventional cryptographic approaches, operating at the upper layer. However, techniques such as channel coding, power (directional antenna and artificial noise), and spread spectrum have been (and continuously) deployed to safeguard against sophisticated attacks. Most of these deployments are theoretical, and a few are enhanced for efficient security against an intruder. In this article, a boundary technique approach is proposed and applied to the physical layer to improve its secrecy‐capacity and subdue adversary effects at the legitimate receiver. Hybrid performance metrics were adopted, and a Monte Carlo simulation was performed. The result obtained using secrecy outage probability, secrecy‐capacity, and intercept‐probability show that our proposed techniques enhance the secret transmission between the main transmitter and legitimate receiver. The simulation results were compared with the analytical methods. It was found that the channel between the transmitter and the main receiver has a better signal‐to‐noise ratio than the corresponding eavesdropper's channel. Conclusively, performance of the proposed technique is validated for applications in emerging wireless communication systems.