{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T01:45:26Z","timestamp":1760233526987,"version":"build-2065373602"},"reference-count":39,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T00:00:00Z","timestamp":1611792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/EEA\/50008\/2020, PES3N (SAICT-45-2017-POCI-01-0145-FEDER-030629), SNOB-5G (CENTRO-01-0247-FEDER- 045929)"],"award-info":[{"award-number":["UIDB\/EEA\/50008\/2020, PES3N (SAICT-45-2017-POCI-01-0145-FEDER-030629), SNOB-5G (CENTRO-01-0247-FEDER- 045929)"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In order to secure wireless communications, we consider the usage of physical-layer security (PLS) mechanisms (i.e., coding for secrecy mechanisms) combined with self-interference generation. We present a prototype implementation of a scrambled coding for secrecy mechanisms with interference generation by the legitimate receiver and the cancellation of the effect of self-interference (SI). Regarding the SI cancellation, four state-of-the-art algorithms were considered: Least mean square (LMS), normalized least mean square (NLMS), recursive least squares (RLS) and QR decomposition recursive least squares (QRDRLS). The prototype implementation is performed in real-world software-defined radio (SDR) devices using GNU-Radio, showing that the LMS outperforms all other algorithms considered (NLMS, RLS and QRDRLS), being the best choice to use in this situation (SI cancellation). It was also shown that it is possible to secure communication using only noise generation by the legitimate receiver, though a variation of the packet loss rate (PLR) and the bit error rate (BER) gaps is observed when moving from the fairest to an advantageous or a disadvantageous scenario. Finally, when noise generation was combined with the adapted scrambled coding for secrecy with a hidden key scheme, a noteworthy security improvement was observed resulting in an increased BER for Eve with minor interference to Bob.<\/jats:p>","DOI":"10.3390\/s21030856","type":"journal-article","created":{"date-parts":[[2021,1,28]],"date-time":"2021-01-28T05:23:05Z","timestamp":1611811385000},"page":"856","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security"],"prefix":"10.3390","volume":"21","author":[{"given":"Andr\u00e9","family":"Silva","sequence":"first","affiliation":[{"name":"Department of Informatics Engineering, Instituto de Telecomunica\u00e7\u00f5es, University of Coimbra, CISUC, 3030-290 Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1124-525X","authenticated-orcid":false,"given":"Marco","family":"Gomes","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Instituto de Telecomunica\u00e7\u00f5es, University of Coimbra, 3030-290 Coimbra, Portugal"}]},{"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[{"name":"CRACS\/INESCTEC, CISUC and Department of Computer Science, Faculty of Sciences, University of Porto, 4169-007 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9375-9440","authenticated-orcid":false,"given":"Willie K.","family":"Harrison","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Brigham Young University, Provo, UT 84602, USA"}]}],"member":"1968","published-online":{"date-parts":[[2021,1,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/JPROC.2016.2558521","article-title":"A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends","volume":"104","author":"Zou","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions","volume":"22","author":"Khan","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems","volume":"28","author":"Shannon","year":"1949","journal-title":"Bell Syst. Tech. J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2128","DOI":"10.1109\/TIFS.2019.2892010","article-title":"Generating a Binary Symmetric Channel for Wiretap Codes","volume":"14","author":"Harrison","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_5","unstructured":"Stallings, W. (2017). Cryptography and Network Security, Pearson Education."},{"key":"ref_6","unstructured":"Synopsys, I. (2019, October 16). The Heartbleed Bug. Available online: http:\/\/heartbleed.com\/."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"54508","DOI":"10.1109\/ACCESS.2019.2913438","article-title":"Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT With Multiple Access Mobile Edge Computing in Smart City","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Bloch, M., and Barros, J. (2011). Physical-Layer Security: From Information Theory to Security Engineering, Cambridge University Press.","DOI":"10.1017\/CBO9780511977985"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Trung, Q., Duong, X.Z., and Poor, H.V. (2017). Trusted Communications with Physical Layer Security for 5G and Beyond, The Institution of Engineering and Technology.","DOI":"10.1049\/PBTE076E"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1878","DOI":"10.1109\/COMST.2018.2883144","article-title":"A Survey of Optimization Approaches for Wireless Physical Layer Security","volume":"21","author":"Wang","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","article-title":"The wire-tap channel","volume":"54","author":"Wyner","year":"1975","journal-title":"Bell Syst. Tech. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1109\/JPROC.2015.2463678","article-title":"Error-Control Coding for Physical-Layer Secrecy","volume":"103","author":"Bloch","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2013.2265141","article-title":"Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security","volume":"30","author":"Harrison","year":"2013","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2735","DOI":"10.1109\/TIT.2008.921680","article-title":"The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming","volume":"54","author":"Tekin","year":"2008","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/TIFS.2011.2111370","article-title":"Wireless Secrecy Regions With Friendly Jamming","volume":"6","author":"Vilela","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2013.2260875","article-title":"Cooperative Security at the Physical Layer: A Summary of Recent Advances","volume":"30","author":"Bassily","year":"2013","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Dryer, Z., Nickerl, A., Gomes, M., Vilela, J., and Harrison, W.K. (2019, January 20\u201324). Full-Duplex Jamming for Enhanced Hidden-Key Secrecy. Proceedings of the IEEE ICC, Shanghai, China.","DOI":"10.1109\/ICC.2019.8761586"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4962","DOI":"10.1109\/TSP.2013.2269049","article-title":"Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers","volume":"61","author":"Zheng","year":"2013","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Gollakota, S., and Katabi, D. (2011, January 10\u201315). Physical layer wireless security made fast and channel independent. Proceedings of the IEEE INFOCOM, Shanghai, China.","DOI":"10.1109\/INFCOM.2011.5934889"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Silva, A., Gomes, M.A.C., Vilela, J.P., and Harrison, W.K. (2020, January 20\u201322). SDR Testbed of Full-Duplex Jamming for Secrecy. Proceedings of the 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Porto, Portugal.","DOI":"10.1109\/CSNDSP49049.2020.9249552"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Pierrot, A.J., Chou, R.A., and Bloch, M.R. (2013, January 16\u201319). Experimental Aspects of Secret-Key Generation in Indoor Wireless Environments. Proceedings of the IEEE Workshop on Signal Processing Advances in Wireless Communications, Darmstadt, Germany.","DOI":"10.1109\/SPAWC.2013.6612134"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/LWC.2017.2740290","article-title":"Key Error Rates in Physical Layer Key Generation: Theoretical Analysis and Measurement-Based Verification","volume":"6","author":"Topal","year":"2017","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"8119","DOI":"10.1109\/TVT.2020.2995540","article-title":"Link-Signature-Based Discriminatory Channel Estimation (LS-DCE) for Physical Layer Security in Stationary and Mobile OFDM Transceivers","volume":"69","author":"Albehadili","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Cabrera-Hern\u00e1ndez, E.A., Granados, J.P., and Tennant, A. (2020, January 15\u201320). Multichannel Dynamic Directional Modulation with Software Defined Radio. Proceedings of the European Conference on Antennas and Propagation (EuCAP), Copenhagen, Denmark.","DOI":"10.23919\/EuCAP48036.2020.9135816"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Hill, K., Gagneja, K.K., and Singh, N. (2019, January 7\u20138). LoRa PHY Range Tests and Software Decoding\u2014Physical Layer Security. Proceedings of the International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India.","DOI":"10.1109\/SPIN.2019.8711682"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Posp\u00ed\u0161il, M., Mar\u0161\u00e1lek, R., and Gotthans, T. (2017, January 15\u201318). Wireless device classification through transmitter imperfections\u2014Evaluation of performance degradation due to the chip heating. Proceedings of the IEEE Radio and Wireless Symposium (RWS), Phoenix, AZ, USA.","DOI":"10.1109\/RWS.2017.7885978"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ali, A., and Fischer, G. (2019, January 1\u20133). Enabling Fake Base Station Detection through Sample-based Higher Order Noise Statistics. Proceedings of the International Conference on Telecommunications and Signal Processing (TSP), Budapest, Hungary.","DOI":"10.1109\/TSP.2019.8769046"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Albehadili, A., Ali, A., Jahan, F., Javaid, A.Y., Oluochy, J., and Devabhaktuniz, V. (2019, January 9\u201312). Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS). Proceedings of the Wireless Telecommunications Symposium (WTS), New York, NY, USA.","DOI":"10.1109\/WTS.2019.8715527"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sarmento, D., Vilela, J., Harrison, W.K., and Gomes, M. (2015, January 6\u201310). Interleaved Coding for Secrecy with a Hidden Key. Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA.","DOI":"10.1109\/GLOCOMW.2015.7414188"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Martins, C., Fernandes, T., Gomes, M., and Vilela, J. (2018, January 3\u20136). Testbed Implementation and Evaluation of Interleaved and Scrambled Coding for Physical-Layer Security. Proceedings of the 2018 IEEE 87th VTC\u2014Spring, Porto, Portugal.","DOI":"10.1109\/VTCSpring.2018.8417699"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"883","DOI":"10.1109\/TIFS.2012.2187515","article-title":"Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis","volume":"7","author":"Baldi","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/LSP.2015.2511821","article-title":"Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime","volume":"23","author":"Vilela","year":"2016","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1109\/TIFS.2011.2134093","article-title":"LDPC Codes for the Gaussian Wiretap Channel","volume":"6","author":"Klinc","year":"2011","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"key":"ref_34","unstructured":"Haykin, S. (2002). Adaptive Filter Theory, Prentice Hall."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Diniz, P.S.R. (2008). Adaptive Filtering: Algorithms and Practical Implementation, Springer. [3rd ed.].","DOI":"10.1007\/978-0-387-68606-6"},{"key":"ref_36","unstructured":"Full Duplex Jamming for Secrecy. Available online: https:\/\/github.com\/IT-UniversityCoimbra-SDRWirelessComm\/Full-Duplex-Jamming-for-Secrecy."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Carreira, M., Monteiro, T., Gomes, M., Vilela, J.P., and Harrison, W.K. (2019, January 20\u201324). Adaptive Physical-Layer Security Through Punctured Coding for Secrecy. Proceedings of the ICC 2019\u20142019 IEEE International Conference on Communications (ICC), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761595"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1369","DOI":"10.1109\/JPROC.2015.2497203","article-title":"Full-Duplex Wireless Communications: Challenges, Solutions, and Future Research Directions","volume":"104","author":"Zhang","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_39","unstructured":"Hayes, M.H. (1996). Statistical Digital Signal Processing and Modeling, John Willey & Sons, Inc."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/3\/856\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:16:24Z","timestamp":1760159784000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/3\/856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,28]]},"references-count":39,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,2]]}},"alternative-id":["s21030856"],"URL":"https:\/\/doi.org\/10.3390\/s21030856","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,1,28]]}}}