46 research outputs found
Wireless communication, sensing, and REM: A security perspective
The diverse requirements of next-generation communication systems necessitate awareness, flexibility, and intelligence as essential building blocks of future wireless networks. The awareness can be obtained from the radio signals in the environment using wireless sensing and radio environment mapping (REM) methods. This is, however, accompanied by threats such as eavesdropping, manipulation, and disruption posed by malicious attackers. To this end, this work analyzes the wireless sensing and radio environment awareness mechanisms, highlighting their vulnerabilities and provides solutions for mitigating them. As an example, the different threats to REM and its consequences in a vehicular communication scenario are described. Furthermore, the use of REM for securing communications is discussed and future directions regarding sensing/REM security are highlighted
Radio Frequency Interference Impact Assessment on Global Navigation Satellite Systems
The Institute for the Protection and Security of the Citizen of the EC Joint Research Centre (IPSC-JRC) has been mandated to perform a study on the Radio Frequency (RF) threat against telecommunications and ICT control systems. This study is divided into two parts. The rst part concerns the assessment of high energy radio frequency (HERF) threats, where the focus is on the generation of electromagnetic pulses (EMP), the development of corresponding devices and the possible impact on ICT and power distribution systems. The second part of the study concerns radio frequency interference (RFI) with regard to global navigation satellite systems (GNSS). This document contributes to the second part and contains a detailed literature study disclosing the weaknesses of GNSS systems. Whereas the HERF analysis only concerns intentional interference issues, this study on GNSS also takes into account unintentional interference, enlarging the spectrum of plausible interference scenarios.JRC.DG.G.6-Security technology assessmen
Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques
With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all.
Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer.
A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed.
The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users.
Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research
Position manipulation attacks to balise-based train automatic stop control
Singapore National Research Foundatio
Advanced optical modulation and fast reconfigurable en/decoding techniques for OCDMA application
With the explosive growth of bandwidth requirement in optical fiber communication
networks, optical code division multiple access (OCDMA) has witnessed tremendous
achievements as one of the promising technologies for optical access networks over the
past decades. In an OCDMA system, optical code processing is one of the key
techniques. Rapid optical code reconfiguration can improve flexibility and security of
the OCDMA system. This thesis focuses on advanced optical modulations and
en/decoding techniques for applications in fast reconfigurable OCDMA systems and
secure optical communications.
A novel time domain spectral phase encoding (SPE) scheme which can rapidly
reconfigure the optical code and is compatible with conventional spectral domain phase
en/decoding by using a pair of dispersive devices and a high speed phase modulator is
proposed. Based on this scheme, a novel advanced modulation technique that can
simultaneously generate both the optical code and the differential-phase-shift-keying
(DPSK) data using a single phase modulator is experimentally demonstrated. A
symmetric time domain spectral phase encoding and decoding (SPE/SPD) scheme using
a similar setup for both the transmitter and receiver is further proposed, based on which
a bit-by-bit optical code scrambling and DPSK data modulation technique for secure
optical communications has been successfully demonstrated. By combining optical
encoding and optical steganography, a novel approach for secure transmission of time
domain spectral phase encoded on-off-keying (OOK)/DPSK-OCDMA signal over
public wavelength-division multiplexing (WDM) network has also been proposed and
demonstrated.
To enable high speed operation of the time domain SPE/SPD scheme and enhance the
system security, a rapid programmable, code-length variable bit-by-bit optical code
shifting technique is proposed. Based on this technique, security improvements for
OOK/DPSK OCDMA systems at data rates of 10Gb/s and 40Gb/s using reconfigurable
optical codes of up to 1024-chip have been achieved.
Finally, a novel tunable two-dimensional coherent optical en/decoder which can
simultaneously perform wavelength hopping and spectral phase encoding based on
coupled micro-ring resonator is proposed and theoretically investigated. The techniques
included in this thesis could be potentially used for future fast reconfigurable and secure
optical code based communication systems
Physical layer security for IoT applications
The increasing demands for Internet of things (IoT) applications and the tremendous increase in the volume of IoT generated data bring novel challenges for the fifth generation (5G) network. Verticals such as e-Health, vehicle to everything (V2X) and unmanned aerial vehicles (UAVs) require solutions that can guarantee low latency, energy efficiency,massive connectivity, and high reliability. In particular, finding strong security mechanisms that satisfy the above is of central importance for bringing the IoT to life.
In this regards, employing physical layer security (PLS) methods could be greatly beneficial for IoT networks. While current security solutions rely on computational complexity, PLS is based on information theoretic proofs. By removing the need for computational power, PLS is ideally suited for resource constrained devices. In detail, PLS can ensure security using the inherit randomness already present in the physical channel. Promising schemes from the physical layer include physical unclonable functions (PUFs), which are seen as the hardware fingerprint of a device, and secret key generation (SKG) from wireless fading coefficients, which provide the wireless fingerprint of the communication channel between devices.
The present thesis develops several PLS-based techniques that pave the way for a new breed of latency-aware, lightweight, security protocols. In particular, the work proposes: i) a fast multi-factor authentication solution with verified security properties based on PUFs, proximity detection and SKG; ii) an authenticated encryption SKG approach that interweaves data transmission and key generation; and, iii) a set of countermeasures to man-in-the-middle and jamming attacks. Overall, PLS solutions show promising performance, especially in the context of IoT applications, therefore, the advances in this thesis should be considered for beyond-5G networks
Orthogonal multicarrier modulation for high-rates mobile and wireless communications
SIGLEAvailable from British Library Document Supply Centre-DSC:DXN037085 / BLDSC - British Library Document Supply CentreGBUnited Kingdo
Unmanned Aerial Vehicle (UAV)-Enabled Wireless Communications and Networking
The emerging massive density of human-held and machine-type nodes implies larger traffic deviatiolns in the future than we are facing today. In the future, the network will be characterized by a high degree of flexibility, allowing it to adapt smoothly, autonomously, and efficiently to the quickly changing traffic demands both in time and space. This flexibility cannot be achieved when the network’s infrastructure remains static. To this end, the topic of UAVs (unmanned aerial vehicles) have enabled wireless communications, and networking has received increased attention. As mentioned above, the network must serve a massive density of nodes that can be either human-held (user devices) or machine-type nodes (sensors). If we wish to properly serve these nodes and optimize their data, a proper wireless connection is fundamental. This can be achieved by using UAV-enabled communication and networks. This Special Issue addresses the many existing issues that still exist to allow UAV-enabled wireless communications and networking to be properly rolled out