340 research outputs found
Recommended from our members
Analog Cancellation of a Known Remote Interference: Hardware Realization and Analysis
The onset of quantum computing threatens commonly used schemes for information secrecy across wireless communication channels, particularly key-based data-level encryption. This calls for secrecy schemes that can provide everlasting secrecy resistant to increased computational power of an adversary. One novel physical layer scheme proposes that an intended receiver capable of performing analog cancellation of a known key-based interference would hold a significant advantage in recovering small underlying messages versus an eavesdropper performing cancellation after analog-to-digital conversion. This advantage holds even in the event that an eavesdropper can recover and use the original key in their digital cancellation. Inspired by this scheme, a flexible software-defined radio receiver design capable of maintaining analog cancellation ratios consistently over 40 dB, reaching up to and over 50 dB, is implemented in this thesis. Maintaining this analog cancellation requires very precise time-frequency synchronization along with accurate modeling and simulation of the channel effects on the interference. The key sources of synchronization error preventing this test bed from achieving and maintaining perfect interference cancellation, sub-sample period timing errors and limited radio frequency stability, are explored for possible improvements.
To further prove robustness of the implemented secrecy scheme, the testbed is shown to operate with both phase-shift keying and frequency-modulated waveforms. Differences in the synchronization algorithm used for the two waveforms are highlighted. Interference cancellation performance is measured for increasing interference bandwidth and shown to decrease with such.
The implications this testbed has on security approaches based on intentional interference employed to confuse eavesdroppers is approached from the framework proposed in the motivating everlasting secrecy scheme. Using analog cancellation levels from the hardware testbed, it is calculated that secrecy rates up to 2.3 bits/symbol are gained by receivers (intended or not) performing interference cancellation in analog rather than on a digital signal processor.
Inspired by the positive gains in secrecy over systems not performing analog cancellation prior to signal reception, a novel secrecy scheme that focuses on the advantage an analog canceller holds in receiver amplifier compression is proposed here. The adversary amplifier is assumed to perform linear cancellation after the interference has passed through their nonlinear amplifier. This is accomplished by deriving the distribution of the interference residual after undergoing an inverse tangent transfer function and perfect linear cancellation. Parameters of this scheme are fit for the radios and cancellation ratios observed in the testbed, resulting in a secrecy gain of 0.95 bits/symbol. The model shows that larger message powers can still be kept secure for the achieved levels of cancellation, thus providing an even greater secrecy gain with increased message transmission power
Physical Layer Security in Integrated Sensing and Communication Systems
The development of integrated sensing and communication (ISAC) systems has been spurred by the growing congestion of the wireless spectrum. The ISAC system detects targets and communicates with downlink cellular users simultaneously. Uniquely for such scenarios, radar targets are regarded as potential eavesdroppers which might surveil the information sent from the base station (BS) to communication users (CUs) via the radar probing signal. To address this issue, we propose security solutions for ISAC systems to prevent confidential information from being intercepted by radar targets.
In this thesis, we firstly present a beamformer design algorithm assisted by artificial noise (AN), which aims to minimize the signal-to-noise ratio (SNR) at the target while ensuring the quality of service (QoS) of legitimate receivers. Furthermore, to reduce the power consumed by AN, we apply the directional modulation (DM) approach to exploit constructive interference (CI). In this case, the optimization problem is designed to maximize the SINR of the target reflected echoes with CI constraints for each CU, while constraining the received symbols at the target in the destructive region.
Apart from the separate functionalities of radar and communication systems above, we investigate sensing-aided physical layer security (PLS), where the ISAC BS first emits an omnidirectional waveform to search for and estimate target directions. Then, we formulate a weighted optimization problem to simultaneously maximize the secrecy rate and minimize the Cram\'er-Rao bound (CRB) with the aid of the AN, designing a beampattern with a wide main beam covering all possible angles of targets. The main beam width of the next iteration depends on the optimal CRB. In this way, the sensing and security functionalities provide mutual benefits, resulting in the improvement of mutual performances with every iteration of the optimization, until convergence.
Overall, numerical results show the effectiveness of the ISAC security designs through the deployment of AN-aided secrecy rate maximization and CI techniques. The sensing-assisted PLS scheme offers a new approach for obtaining channel information of eavesdroppers, which is treated as a limitation of conventional PLS studies. This design gains mutual benefits in both single and multi-target scenarios
Toward Multi-Functional 6G Wireless Networks: Integrating Sensing, Communication, and Security
Integrated sensing and communication (ISAC) has recently emerged as a candidate 6G technology, aiming to unify the two key operations of the future network in a spectrum/energy/cost-efficient way. ISAC systems communicate and sense for targets using a common waveform, a common hardware platform, and ultimately the same network infrastructure. Nevertheless, the inclusion of information signaling in the probing waveform for target sensing raises challenges from the perspective of information security. At the same time, the sensing capability incorporated in ISAC transmission offers unique opportunities to design secure ISAC techniques. This overview article discusses these unique challenges and opportunities for the next generation of ISAC networks. We first briefly discuss the fundamentals of waveform design for sensing and communication. Then we detail the challenges and contradictory objectives involved in securing ISAC transmission, along with state-of-the-art approaches to ensure security. We then identify the new opportunity of using the sensing capability to obtain knowledge target information as an enabling approach against the known weak-nesses of PHY security. Finally, we illustrate some low-cost secure ISAC architectures, followed by a series of open research topics. This family of sensing-aided secure ISAC techniques brings new insight on providing information security, with an eye on robust and hardware-constrained designs tailored for low-cost ISAC devices
Toward Multi-Functional 6G Wireless Networks: Integrating Sensing, Communication, and Security
Integrated sensing and communication (ISAC) has recently emerged as a candidate 6G technology, aiming to unify the two key operations of the future network in a spectrum/energy/cost-efficient way. ISAC systems communicate and sense for targets using a common waveform, a common hardware platform, and ultimately the same network infrastructure. Nevertheless, the inclusion of information signaling in the probing waveform for target sensing raises challenges from the perspective of information security. At the same time, the sensing capability incorporated in ISAC transmission offers unique opportunities to design secure ISAC techniques. This overview article discusses these unique challenges and opportunities for the next generation of ISAC networks. We first briefly discuss the fundamentals of waveform design for sensing and communication. Then we detail the challenges and contradictory objectives involved in securing ISAC transmission, along with state-of-the-art approaches to ensure security. We then identify the new opportunity of using the sensing capability to obtain knowledge target information as an enabling approach against the known weak-nesses of PHY security. Finally, we illustrate some low-cost secure ISAC architectures, followed by a series of open research topics. This family of sensing-aided secure ISAC techniques brings new insight on providing information security, with an eye on robust and hardware-constrained designs tailored for low-cost ISAC devices
Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security
In this paper, we investigate the sensing-aided
physical layer security (PLS) towards Integrated Sensing and
Communication (ISAC) systems. A well-known limitation of PLS
is the need to have information about potential eavesdroppers
(Eves). The sensing functionality of ISAC offers an enabling role
here, by estimating the directions of potential Eves to inform PLS.
In our approach, the ISAC base station (BS) firstly emits an omnidirectional waveform to search for potential Eves’ directions by
employing the combined Capon and approximate maximum likelihood (CAML) technique. Using the resulting information about
potential Eves, we formulate secrecy rate expressions, that are a
function of the Eves’ estimation accuracy. We then formulate a
weighted optimization problem to simultaneously maximize the
secrecy rate and minimize the CRB with the aid of the artificial
noise (AN), and minimize the CRB of targets’/Eves’ estimation.
By taking the possible estimation errors into account, we enforce
a beampattern constraint with a wide main beam covering all
possible directions of Eves. This implicates that security needs
to be enforced in all these directions. By improving estimation
accuracy, the sensing and security functionalities provide mutual
benefits, resulting in improvement of the mutual performances
with every iteration of the optimization, until convergence. Our
results avail of these mutual benefits and reveal the usefulness
of sensing as an enabler for practical PLS
Sensing-Assisted Eavesdropper Estimation: An ISAC Breakthrough in Physical Layer Security
In this paper, we investigate the sensing-aided physical layer security (PLS) towards Integrated Sensing and Communication (ISAC) systems. A well-known limitation of PLS is the need to have information about potential eavesdroppers (Eves). The sensing functionality of ISAC offers an enabling role here, by estimating the directions of potential Eves to inform PLS. In our approach, the ISAC base station (BS) firstly emits an omnidirectional waveform to search for potential Eves’ directions by employing the combined Capon and approximate maximum likelihood (CAML) technique. Using the resulting information about potential Eves, we formulate secrecy rate expressions, which is a function of the Eves’ estimation accuracy. We then formulate a weighted optimization problem to simultaneously maximize the secrecy rate with the aid of the artificial noise (AN), and minimize the Cramér-Rao Bound (CRB) of targets’/Eves’ estimation. By taking the possible estimation errors into account, we enforce a beampattern constraint with a wide main beam covering all possible directions of Eves. This implicates that security needs to be enforced in all these directions. By improving estimation accuracy, the sensing and security functionalities provide mutual benefits, resulting in improvement of the mutual performances with every iteration of the optimization, until convergence. Our results avail of these mutual benefits and reveal the usefulness of sensing as an enabler for practical PLS
- …