50 research outputs found

    Constructing Reciprocal Channel Coefficients for Secret Key Generation in FDD Systems

    Get PDF

    Securing NextG networks with physical-layer key generation: A survey

    Get PDF
    As the development of next-generation (NextG) communication networks continues, tremendous devices are accessing the network and the amount of information is exploding. However, with the increase of sensitive data that requires confidentiality to be transmitted and stored in the network, wireless network security risks are further amplified. Physical-layer key generation (PKG) has received extensive attention in security research due to its solid information-theoretic security proof, ease of implementation, and low cost. Nevertheless, the applications of PKG in the NextG networks are still in the preliminary exploration stage. Therefore, we survey existing research and discuss (1) the performance advantages of PKG compared to cryptography schemes, (2) the principles and processes of PKG, as well as research progresses in previous network environments, and (3) new application scenarios and development potential for PKG in NextG communication networks, particularly analyzing the effect and prospects of PKG in massive multiple-input multiple-output (MIMO), reconfigurable intelligent surfaces (RISs), artificial intelligence (AI) enabled networks, integrated space-air-ground network, and quantum communication. Moreover, we summarize open issues and provide new insights into the development trends of PKG in NextG networks

    On the feasibility and applications of in-band full-duplex radios for future wireless networks

    Get PDF
    Due to the continuous increase of the demands for the wireless network’s capacity, in-band full-duplex (IBFD) has recently become a key research topic due to its potential to double spectral efficiency, reduce latency, enhance emerging applications, etc., by transmitting and receiving simultaneously over the same channel. Meanwhile, many studies in the literature experimentally demonstrated the feasibility of IBFD radios, which leads to the belief that it is possible to introduce IBFD in the standard of the next-generation networks. Therefore, in this thesis, we timely study the feasibility of IBFD and investigate its advantages for emerging applications in future networks. In the first part, we investigate the interference suppression methods to maximize the IBFD gain by minimizing the effects of self-interference (SI) and co-channel interference (CCI). To this end, we first study a 3-step self-interference cancellation (SIC) scheme. We focus on the time domain-based analog canceller and nonlinear digital canceller, explaining their rationale, demonstrating their effectiveness, and finding the optimal design by minimizing the residual effects. To break the limitation of conventional electrical radio frequency (RF) cancellers, we study the photonic-assisted canceller (PAC) and propose a new design, namely a fiber array-based canceller. We propose a new low-complexity tuning algorithm for the PAC. The effectiveness of the proposed fiber array canceller is demonstrated via simulations. Furthermore, we construct a prototype of the fiber array canceller with two taps and carry out experiments in real-world environments. Results show that the 3-step cancellation scheme can bring the SI close to the receiver's noise floor. Then, we consider the multiple-input multiple-output (MIMO) scenarios, proposing to employ hybrid RF-digital beamforming to reduce the implementation cost and studying its effects on the SIC design. Additionally, we propose a user allocation algorithm to reduce the CCI from the physical layer. A heterogeneous industrial Internet of Things (IIoT) scenario is considered, while the proposed algorithm can be generalized by modifying the parameters to fit any other network. In the second part, we study the beamforming schemes for IBFD multi-cell multi-user (IBFD-MCMU) networks. The transceiver hardware impairments (HWIs) and channel uncertainty are considered for robustness. We first enhance zero-forcing (ZF) and maximum ratio transmission and combining (MRTC) beamforming to be compatible with IBFD-MCMU networks in the presence of multi-antenna users. Then, we study beamforming for SIC, which is challenging for MCMU networks due to the limited antennas but complex interference. We propose a minimum mean-squared error (MMSE)-based scheme to enhance the SIC performance while minimizing its effects on the sum rate. Furthermore, we investigate a robust joint power allocation and beamforming (JPABF) scheme, which approaches the performance of existing optimal designs with reduced complexity. Their performance is evaluated and compared through 3GPP-based simulations. In the third part, we investigate the advantages of applying IBFD radios for physical layer security (PLS). We focus on a channel frequency response (CFR)-based secret key generation (SKG) scheme in MIMO systems. We formulate the intrinsic imperfections of IBFD radios (e.g., SIC overheads and noise due to imperfect SIC) and derive their effects on the probing errors. Then we derive closed-form expressions for the secret key capacity (SKC) of the SKG scheme in the presence of a passive eavesdropper. We analyze the asymptotic behavior of the SKC in the high-SNR regime and reveal the fundamental limits for IBFD and half-duplex (HD) radios. Based on the asymptotic SKC, numerical results illustrate that effective analog self-interference cancellation (ASIC) is the basis for IBFD to gain benefits over HD. Additionally, we investigate essential processing for the CFR-based SKG scheme and verify its effectiveness via simulations and the National Institute of Standards and Technology (NIST) test. In the fourth part, we consider a typical application of IBFD radios: integrated sensing and communication (ISAC). To provide reliable services in high-mobility scenarios, we introduce orthogonal time frequency space (OTFS) modulation and develop a novel framework for OTFS-ISAC. We give the channel representation in different domains and reveal the limitations and disadvantages of existing ISAC frameworks for OTFS waveforms and propose a novel radar sensing method, including a conventional MUSIC algorithm for angle estimation and a delay-time domain-based range and velocity estimator. Additionally, we study the communication design based on the estimated radar sensing parameters. To enable reliable IBFD radios in high-mobility scenarios, a SIC scheme compatible with OTFS and rapidly-changing channels is proposed, which is lacking in the literature. Numerical results demonstrate that the proposed ISAC waveform and associated estimation algorithm can provide both reliable communications and accurate radar sensing with reduced latency, improved spectral efficiency, etc

    Key Generation for Internet of Things: A Contemporary Survey

    Get PDF
    Key generation is a promising technique to bootstrap secure communications for the Internet of Things (IoT) devices that have no prior knowledge between each other. In the past few years, a variety of key generation protocols and systems have been proposed. In this survey, we review and categorise recent key generation systems based on a novel taxonomy. Then, we provide both quantitative and qualitative comparisons of existing approaches. We also discuss the security vulnerabilities of key generation schemes and possible countermeasures. Finally, we discuss the current challenges and point out several potential research directions

    Key Generation for Internet of Things

    Get PDF
    Key generation is a promising technique to bootstrap secure communications for the Internet of Things devices that have no prior knowledge between each other. In the past few years, a variety of key generation protocols and systems have been proposed. In this survey, we review and categorise recent key generation systems based on a novel taxonomy. Then, we provide both quantitative and qualitative comparisons of existing approaches. We also discuss the security vulnerabilities of key generation schemes and possible countermeasures. Finally, we discuss the current challenges and point out several potential research directions

    Telecommunications Networks

    Get PDF
    This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing

    Skema Secret Key Generation (SKG) untuk Keamanan pada Sistem Komunikasi di Lingkungan Wireless

    Get PDF
    Skema Secret Key Generation (SKG) yang mengeksploitasi sifat reciprocity dan keacakan kanal wireless untuk membangkitkan secret key telah menjadi area penelitian yang semakin menarik dan menjanjikan. Terdapat 3 permasalahan utama dalam pembangunan skema SKG yang efisien yang harus diatasi, yaitu trade-off antara parameter performansi Key Disagreement Rate (KDR) dan Key Generation Rate (KGR), tingginya kompleksitas implementasi karena banyaknya tahapan yang harus dilalui, serta tidak efisiennya skema SKG yang dibangun sehingga tidak sesuai jika diimplementasikan pada perangkat Internet of Things(IoT) yang memiliki keterbatasan sumber daya. Disertasi ini berkontribusi dalam mengatasi ketiga permasalahan tersebut. Kontribusi pertama yang dilakukan untuk mengatasi trade-off antara parameter performansi KDR dan KGR adalah didapatkannya kombinasi yang optimal antara metode pra proses yaitu Kalman Filter, Modified Polynomial Regression (MPR), serta Savitzky Golay Filter dan kuantisasi multilevel. Hasil yang didapat adalah penurunan KDR dan peningkatan KGR dibandingkan dengan skema yang eksisting. Kontribusi kedua dari disertasi ini adalah mekanisme penyederhanaan skema SKG dengan kombinasi metode Modified Kalman (MK) serta Combined Multilevel Quantization (CMQ) sehingga bisa dihasilkan secret key yang identik tanpa melalui tahap rekonsiliasi informasi. Hasil pengujian yang dilakukan menghasilkan 4 blok 128-bit data di lingkungan tanpa halangan serta 2 blok 128-bit data yang memiliki KDR sebesar 0 sehingga tidak memerlukan koreksi untuk mendapatkan secret key yang identik. Kontribusi ketiga dari disertasi ini adalah didapatkannya skema SKG Signal Strength Exchange (SSE) yang efisien dalam hal waktu komputasi dan overhead komunikasi dengan menggunakan metode Synchronized Quantization (SQ) sebagai bagian dari skema SKG SSE. Hasil yang didapat menunjukkan penurunan waktu komputasi menjadi sebesar 3.8% dan overhead komunikasi menjadi sebesar 34% skema yang eksisting. Kontribusi yang dihasilkan dalam disertasi ini diharapkan dapat menjadi salah satu solusi alternatif pembentukan kunci simetris yang tidak membutuhkan kompleksitas komputasi serta Trusted Third Party (TTP), sehingga cocok jika digunakan pada berbagai aplikasi IoT

    Modelling, Dimensioning and Optimization of 5G Communication Networks, Resources and Services

    Get PDF
    This reprint aims to collect state-of-the-art research contributions that address challenges in the emerging 5G networks design, dimensioning and optimization. Designing, dimensioning and optimization of communication networks resources and services have been an inseparable part of telecom network development. The latter must convey a large volume of traffic, providing service to traffic streams with highly differentiated requirements in terms of bit-rate and service time, required quality of service and quality of experience parameters. Such a communication infrastructure presents many important challenges, such as the study of necessary multi-layer cooperation, new protocols, performance evaluation of different network parts, low layer network design, network management and security issues, and new technologies in general, which will be discussed in this book
    corecore