1,364 research outputs found
Recent Advances in Cellular D2D Communications
Device-to-device (D2D) communications have attracted a great deal of attention from researchers in recent years. It is a promising technique for offloading local traffic from cellular base stations by allowing local devices, in physical proximity, to communicate directly with each other. Furthermore, through relaying, D2D is also a promising approach to enhancing service coverage at cell edges or in black spots. However, there are many challenges to realizing the full benefits of D2D. For one, minimizing the interference between legacy cellular and D2D users operating in underlay mode is still an active research issue. With the 5th generation (5G) communication systems expected to be the main data carrier for the Internet-of-Things (IoT) paradigm, the potential role of D2D and its scalability to support massive IoT devices and their machine-centric (as opposed to human-centric) communications need to be investigated. New challenges have also arisen from new enabling technologies for D2D communications, such as non-orthogonal multiple access (NOMA) and blockchain technologies, which call for new solutions to be proposed. This edited book presents a collection of ten chapters, including one review and nine original research works on addressing many of the aforementioned challenges and beyond
Decryption Failure Attacks on Post-Quantum Cryptography
This dissertation discusses mainly new cryptanalytical results related to issues of securely implementing the next generation of asymmetric cryptography, or Public-Key Cryptography (PKC).PKC, as it has been deployed until today, depends heavily on the integer factorization and the discrete logarithm problems.Unfortunately, it has been well-known since the mid-90s, that these mathematical problems can be solved due to Peter Shor's algorithm for quantum computers, which achieves the answers in polynomial time.The recently accelerated pace of R&D towards quantum computers, eventually of sufficient size and power to threaten cryptography, has led the crypto research community towards a major shift of focus.A project towards standardization of Post-quantum Cryptography (PQC) was launched by the US-based standardization organization, NIST. PQC is the name given to algorithms designed for running on classical hardware/software whilst being resistant to attacks from quantum computers.PQC is well suited for replacing the current asymmetric schemes.A primary motivation for the project is to guide publicly available research toward the singular goal of finding weaknesses in the proposed next generation of PKC.For public key encryption (PKE) or digital signature (DS) schemes to be considered secure they must be shown to rely heavily on well-known mathematical problems with theoretical proofs of security under established models, such as indistinguishability under chosen ciphertext attack (IND-CCA).Also, they must withstand serious attack attempts by well-renowned cryptographers both concerning theoretical security and the actual software/hardware instantiations.It is well-known that security models, such as IND-CCA, are not designed to capture the intricacies of inner-state leakages.Such leakages are named side-channels, which is currently a major topic of interest in the NIST PQC project.This dissertation focuses on two things, in general:1) how does the low but non-zero probability of decryption failures affect the cryptanalysis of these new PQC candidates?And 2) how might side-channel vulnerabilities inadvertently be introduced when going from theory to the practice of software/hardware implementations?Of main concern are PQC algorithms based on lattice theory and coding theory.The primary contributions are the discovery of novel decryption failure side-channel attacks, improvements on existing attacks, an alternative implementation to a part of a PQC scheme, and some more theoretical cryptanalytical results
Usability of structured lattices for a post-quantum cryptography: practical computations, and a study of some real Kummer extensions
Lattice-based cryptography is an excellent candidate for post-quantum cryptography, i.e. cryptosystems which are resistant to attacks run on quantum computers. For efficiency reason, most of the constructions explored nowadays are based on structured lattices, such as module lattices or ideal lattices. The security of most constructions can be related to the hardness of retrieving a short element in such lattices, and one does not know yet to what extent these additional structures weaken the cryptosystems. A related problem – which is an extension of a classical problem in computational number theory – called the Short Principal Ideal Problem (or SPIP), consists of finding a short generator of a principal ideal. Its assumed hardness has been used to build some cryptographic schemes. However it has been shown to be solvable in quantum polynomial time over cyclotomic fields, through an attack which uses the Log-unit lattice of the field considered. Later, practical results showed that multiquadratic fields were also weak to this strategy.
The main general question that we study in this thesis is To what extent can structured lattices be used to build a post-quantum cryptography
Cellular and Wi-Fi technologies evolution: from complementarity to competition
This PhD thesis has the characteristic to span over a long time because while working on it, I was working as a research engineer at CTTC with highly demanding development duties. This has delayed the deposit more than I would have liked. On the other hand, this has given me the privilege of witnessing and studying how wireless technologies have been evolving over a decade from 4G to 5G and beyond.
When I started my PhD thesis, IEEE and 3GPP were defining the two main wireless technologies at the time, Wi-Fi and LTE, for covering two substantially complementary market targets. Wi-Fi was designed to operate mostly indoor, in unlicensed spectrum, and was aimed to be a simple and cheap technology. Its primary technology for coexistence was based on the assumption that the spectrum on which it was operating was for free, and so it was designed with interference avoidance through the famous CSMA/CA protocol. On the other hand, 3GPP was designing technologies for licensed spectrum, a costly kind of spectrum. As a result, LTE was designed to take the best advantage of it while providing the best QoE in mainly outdoor scenarios.
The PhD thesis starts in this context and evolves with these two technologies. In the first chapters, the thesis studies radio resource management solutions for standalone operation of Wi-Fi in unlicensed and LTE in licensed spectrum. We anticipated the now fundamental machine learning trend by working on machine learning-based radio resource management solutions to improve LTE and Wi-Fi operation in their respective spectrum. We pay particular attention to small cell deployments aimed at improving the spectrum efficiency in licensed spectrum, reproducing small range scenarios typical of Wi-Fi settings.
IEEE and 3GPP followed evolving the technologies over the years: Wi-Fi has grown into a much more complex and sophisticated technology, incorporating the key features of cellular technologies, like HARQ, OFDMA, MU-MIMO, MAC scheduling and spatial reuse. On the other hand, since Release 13, cellular networks have also been designed for unlicensed spectrum. As a result, the two last chapters of this thesis focus on coexistence scenarios, in which LTE needs to be designed to coexist with Wi-Fi fairly, and NR, the radio access for 5G, with Wi-Fi in 5 GHz and WiGig in 60 GHz. Unlike LTE, which was adapted to operate in unlicensed spectrum, NR-U is natively designed with this feature, including its capability to operate in unlicensed in a complete standalone fashion, a fundamental new milestone for cellular. In this context, our focus of analysis changes. We consider that these two technological families are no longer targeting complementarity but are now competing, and we claim that this will be the trend for the years to come.
To enable the research in these multi-RAT scenarios, another fundamental result of this PhD thesis, besides the scientific contributions, is the release of high fidelity models for LTE and NR and their coexistence with Wi-Fi and WiGig to the ns-3 open-source community. ns-3 is a popular open-source network simulator, with the characteristic to be multi-RAT and so naturally allows the evaluation of coexistence scenarios between different technologies. These models, for which I led the development, are by academic citations, the most used open-source simulation models for LTE and NR and havereceived fundings from industry (Ubiquisys, WFA, SpiderCloud, Interdigital, Facebook) and federal agencies (NIST, LLNL) over the years.Aquesta tesi doctoral té la característica d’allargar-se durant un llarg període de temps ja que mentre treballava en ella, treballava com a enginyera investigadora a CTTC amb tasques de desenvolupament molt exigents. Això ha endarrerit el dipositar-la més del que m’hagués agradat. D’altra banda, això m’ha donat el privilegi de ser testimoni i estudiar com han evolucionat les tecnologies sense fils durant més d’una dècada des del 4G fins al 5G i més enllà. Quan vaig començar la tesi doctoral, IEEE i 3GPP estaven definint les dues tecnologies sense fils principals en aquell moment, Wi-Fi i LTE, que cobreixen dos objectius de mercat substancialment complementaris. Wi-Fi va ser dissenyat per funcionar principalment en interiors, en espectre sense llicència, i pretenia ser una tecnologia senzilla i barata. La seva tecnologia primària per a la convivència es basava en el supòsit que l’espectre en el que estava operant era de franc, i, per tant, es va dissenyar simplement evitant interferències a través del famós protocol CSMA/CA. D’altra banda, 3GPP estava dissenyant tecnologies per a espectres amb llicència, un tipus d’espectre costós. Com a resultat, LTE està dissenyat per treure’n el màxim profit alhora que proporciona el millor QoE en escenaris principalment a l’aire lliure. La tesi doctoral comença amb aquest context i evoluciona amb aquestes dues tecnologies. En els primers capítols, estudiem solucions de gestió de recursos de radio per a operacions en espectre de Wi-Fi sense llicència i LTE amb llicència. Hem anticipat l’actual tendència fonamental d’aprenentatge automàtic treballant solucions de gestió de recursos de radio basades en l’aprenentatge automàtic per millorar l’LTE i Wi-Fi en el seu espectre respectiu. Prestem especial atenció als desplegaments de cèl·lules petites destinades a millorar la eficiència d’espectre llicenciat, reproduint escenaris de petit abast típics de la configuració Wi-Fi. IEEE i 3GPP van seguir evolucionant les tecnologies al llarg dels anys: El Wi-Fi s’ha convertit en una tecnologia molt més complexa i sofisticada, incorporant les característiques clau de les tecnologies cel·lulars, com ara HARQ i la reutilització espacial. D’altra banda, des de la versió 13, també s’han dissenyat xarxes cel·lulars per a espectre sense llicència. Com a resultat, els dos darrers capítols d’aquesta tesi es centren en aquests escenaris de convivència, on s’ha de dissenyar LTE per conviure amb la Wi-Fi de manera justa, i NR, l’accés a la radio per a 5G amb Wi-Fi a 5 GHz i WiGig a 60 GHz. A diferència de LTE, que es va adaptar per funcionar en espectre sense llicència, NR-U està dissenyat de forma nativa amb aquesta característica, inclosa la seva capacitat per operar sense llicència de forma autònoma completa, una nova fita fonamental per al mòbil. En aquest context, el nostre focus d’anàlisi canvia. Considerem que aquestes dues famílies de tecnologia ja no estan orientades cap a la complementarietat, sinó que ara competeixen, i afirmem que aquesta serà el tendència per als propers anys. Per permetre la investigació en aquests escenaris multi-RAT, un altre resultat fonamental d’aquesta tesi doctoral, a més de les aportacions científiques, és l’alliberament de models d’alta fidelitat per a LTE i NR i la seva coexistència amb Wi-Fi a la comunitat de codi obert ns-3. ns-3 és un popular simulador de xarxa de codi obert, amb la característica de ser multi-RAT i, per tant, permet l’avaluació de manera natural d’escenaris de convivència entre diferents tecnologies. Aquests models, pels quals he liderat el desenvolupament, són per cites acadèmiques, els models de simulació de codi obert més utilitzats per a LTE i NR i que han rebut finançament de la indústria (Ubiquisys, WFA, SpiderCloud, Interdigital, Facebook) i agències federals (NIST, LLNL) al llarg dels anys.Esta tesis doctoral tiene la característica de extenderse durante mucho tiempo porque mientras trabajaba en ella, trabajaba como ingeniera de investigación en CTTC con tareas de desarrollo muy exigentes. Esto ha retrasado el depósito más de lo que me hubiera gustado. Por otro lado,
gracias a ello, he tenido el privilegio de presenciar y estudiar como las tecnologías inalámbricas
han evolucionado durante una década, de 4G a 5G y más allá.
Cuando comencé mi tesis doctoral, IEEE y 3GPP estaban definiendo las dos principales
tecnologías inalámbricas en ese momento, Wi-Fi y LTE, cumpliendo dos objetivos de mercado
sustancialmente complementarios. Wi-Fi fue diseñado para funcionar principalmente en
interiores, en un espectro sin licencia, y estaba destinado a ser una tecnología simple y barata.
Su tecnología primaria para la convivencia se basaba en el supuesto en que el espectro en
el que estaba operando era gratis, y así fue diseñado simplemente evitando interferencias a
través del famoso protocolo CSMA/CA. Por otro lado, 3GPP estaba diseñando tecnologías
para espectro con licencia, un tipo de espectro costoso. Como resultado, LTE está diseñado
para aprovechar el espectro al máximo proporcionando al mismo tiempo el mejor QoE en
escenarios principalmente al aire libre.
La tesis doctoral parte de este contexto y evoluciona con estas dos tecnologías. En los
primeros capítulos, estudiamos las soluciones de gestión de recursos de radio para operación
en espectro Wi-Fi sin licencia y LTE con licencia. Anticipamos la tendencia ahora fundamental
de aprendizaje automático trabajando en soluciones de gestión de recursos de radio para
mejorar LTE y funcionamiento deWi-Fi en su respectivo espectro. Prestamos especial atención
a las implementaciones de células pequeñas destinadas a mejorar la eficiencia de espectro
licenciado, reproduciendo los típicos escenarios de rango pequeño de la configuración Wi-Fi.
IEEE y 3GPP siguieron evolucionando las tecnologías a lo largo de los años: Wi-Fi
se ha convertido en una tecnología mucho más compleja y sofisticada, incorporando las
características clave de las tecnologías celulares, como HARQ, OFDMA, MU-MIMO, MAC
scheduling y la reutilización espacial. Por otro lado, desde la Release 13, también se han
diseñado redes celulares para espectro sin licencia. Como resultado, los dos últimos capítulos
de esta tesis se centran en estos escenarios de convivencia, donde LTE debe diseñarse para
coexistir con Wi-Fi de manera justa, y NR, el acceso por radio para 5G con Wi-Fi en 5 GHz
y WiGig en 60 GHz. A diferencia de LTE, que se adaptó para operar en espectro sin licencia,
NR-U está diseñado de forma nativa con esta función, incluyendo su capacidad para operar
sin licencia de forma completamente independiente, un nuevo hito fundamental para los
celulares. En este contexto, cambia nuestro enfoque de análisis. Consideramos que estas dos
familias tecnológicas ya no tienen como objetivo la complementariedad, sino que ahora están
compitiendo, y afirmamos que esta será la tendencia para los próximos años.
Para permitir la investigación en estos escenarios de múltiples RAT, otro resultado fundamental
de esta tesis doctoral, además de los aportes científicos, es el lanzamiento de modelos de alta
fidelidad para LTE y NR y su coexistencia con Wi-Fi y WiGig a la comunidad de código
abierto de ns-3. ns-3 es un simulador popular de red de código abierto, con la característica
de ser multi-RAT y así, naturalmente, permite la evaluación de escenarios de convivencia
entre diferentes tecnologías. Estos modelos, para los cuales lideré el desarrollo, son por citas
académicas, los modelos de simulación de código abierto más utilizados para LTE y NR y
han recibido fondos de la industria (Ubiquisys, WFA, SpiderCloud, Interdigital, Facebook) y
agencias federales (NIST, LLNL) a lo largo de los años.Postprint (published version
SCA-LDPC: A Code-Based Framework for Key-Recovery Side-Channel Attacks on Post-Quantum Encryption Schemes
Whereas theoretical attacks on standardized crypto primitives rarely lead to actual practical attacks, the situation is different for side-channel attacks. Improvements in the performance of side-channel attacks are of utmost importance.
In this paper, we propose a framework to be used in key-recovery side-channel attacks on CCA-secure post-quantum encryption schemes. The basic idea is to construct chosen ciphertext queries to a plaintext checking oracle that collects information on a set of secret variables in a single query. Then a large number of such queries is considered, each related to a different set of secret variables, and they are modeled as a low-density parity-check code (LDPC code). Secret variables are finally determined through efficient iterative decoding methods, such as belief propagation, using soft information. The utilization of LDPC codes offers efficient decoding, source compression, and error correction benefits. It has been demonstrated that this approach provides significant improvements compared to previous work by reducing the required number of queries, such as the number of traces in a power attack.
The framework is demonstrated and implemented in two different cases. On one hand, we attack implementations of HQC in a timing attack, lowering the number of required traces considerably compared to attacks in previous work. On the other hand, we describe and implement a full attack on a masked implementation of Kyber using power analysis. Using the ChipWhisperer evaluation platform, our real-world attacks recover the long-term secret key of a first-order masked implementation of Kyber-768 with an average of only 12 power traces
Data Hiding in Digital Video
With the rapid development of digital multimedia technologies, an old method which is called steganography has been sought to be a solution for data hiding applications such as digital watermarking and covert communication. Steganography is the art of secret communication using a cover signal, e.g., video, audio, image etc., whereas the counter-technique, detecting the existence of such as a channel through a statistically trained classifier, is called steganalysis.
The state-of-the art data hiding algorithms utilize features; such as Discrete Cosine Transform (DCT) coefficients, pixel values, motion vectors etc., of the cover signal to convey the message to the receiver side. The goal of embedding algorithm is to maximize the number of bits sent to the decoder side (embedding capacity) with maximum robustness against attacks while keeping the perceptual and statistical distortions (security) low. Data Hiding schemes are characterized by these three conflicting requirements: security against steganalysis, robustness against channel associated and/or intentional distortions, and the capacity in terms of the embedded payload. Depending upon the application it is the designer\u27s task to find an optimum solution amongst them.
The goal of this thesis is to develop a novel data hiding scheme to establish a covert channel satisfying statistical and perceptual invisibility with moderate rate capacity and robustness to combat steganalysis based detection. The idea behind the proposed method is the alteration of Video Object (VO) trajectory coordinates to convey the message to the receiver side by perturbing the centroid coordinates of the VO. Firstly, the VO is selected by the user and tracked through the frames by using a simple region based search strategy and morphological operations. After the trajectory coordinates are obtained, the perturbation of the coordinates implemented through the usage of a non-linear embedding function, such as a polar quantizer where both the magnitude and phase of the motion is used. However, the perturbations made to the motion magnitude and phase were kept small to preserve the semantic meaning of the object motion trajectory.
The proposed method is well suited to the video sequences in which VOs have smooth motion trajectories. Examples of these types could be found in sports videos in which the ball is the focus of attention and exhibits various motion types, e.g., rolling on the ground, flying in the air, being possessed by a player, etc. Different sports video sequences have been tested by using the proposed method. Through the experimental results, it is shown that the proposed method achieved the goal of both statistical and perceptual invisibility with moderate rate embedding capacity under AWGN channel with varying noise variances. This achievement is important as the first step for both active and passive steganalysis is the detection of the existence of covert channel.
This work has multiple contributions in the field of data hiding. Firstly, it is the first example of a data hiding method in which the trajectory of a VO is used. Secondly, this work has contributed towards improving steganographic security by providing new features: the coordinate location and semantic meaning of the object
Spectral-energy efficiency trade-off of relay-aided cellular networks
Wireless communication networks are traditionally designed to operate at high spectral
e ciency with less emphasis on power consumption as it is assumed that endless
power supply is available through the power grid where the cells are connected to. As
new generations of mobile networks exhibit decreasing gains in spectral e ciency, the
mobile industry is forced to consider energy reform policies in order to sustain the
economic growth of itself and other industries relying on it. Consequently, the energy
e ciency of conventional direct transmission cellular networks is being examined
while alternative green network architectures are also explored. The relay-aided cellular
network is being considered as one of the potential network architecture for energy
e cient transmission. However, relaying transmission incurs multiplexing loss due to
its multi-hop protocol. This, in turn, reduces network spectral e ciency. Furthermore,
interference is also expected to increase with the deployment of Relay Stations
(RSs) in the network. This thesis examines the power consumption of the conventional
direct transmission cellular network and contributes to the development of the
relay-aided cellular network.
Firstly, the power consumption of the direct transmission cellular network is investigated.
While most work considered transmitter side strategies, the impact of the
receiver on the Base Station (BS) total power consumption is investigated here. Both
the zero-forcing and minimum mean square error weight optimisation approaches are
considered for both the conventional linear and successive interference cancellation
receivers. The power consumption model which includes both the radio frequency
transmit power and circuit power is described. The in
uence of the receiver interference
cancellation techniques, the number of transceiver antennas, circuit power
consumption and inter-cell interference on the BS total power consumption is investigated.
Secondly, the spectral-energy e ciency trade-o in the relay-aided cellular network is
investigated. The signal forwarding and interference forwarding relaying paradigms
are considered with the direct transmission cellular network taken as the baseline.
This investigation serves to understand the dynamics in the performance trade-o .
To select a suitable balance point in the trade-o , the economic e ciency metric is
proposed whereby the spectral-energy e ciency pair which maximises the economic
pro tability is found. Thus, the economic e ciency metric can be utilised as an alternative
means to optimise the relay-aided cellular network while taking into account
the inherent spectral-energy e ciency trade-o .
Finally, the method of mitigating interference in the relay-aided cellular network is
demonstrated by means of the proposed relay cooperation scheme. In the proposed
scheme, both joint RS decoding and independent RS decoding approaches are considered
during the broadcast phase while joint relay transmission is employed in the
relay phase. Two user selection schemes requiring global Channel State Information
(CSI) are considered. The partial semi-orthogonal user selection method with reduced
CSI requirement is then proposed. As the cooperative cost limits the practicality of
cooperative schemes, the cost incurred at the cooperative links between the RSs is
investigated for varying degrees of RS cooperation. The performance of the relay
cooperation scheme with di erent relay frequency reuse patterns is considered as well.
In a nutshell, the research presented in this thesis reveals the impact of the receiver on
the BS total power consumption in direct transmission cellular networks. The relayaided
cellular network is then presented as an alternative architecture for energy
e cient transmission. The economic e ciency metric is proposed to maximise the
economic pro tability of the relay network while taking into account the existing
spectral-energy e ciency trade-o . To mitigate the interference from the RSs, the
relay cooperation scheme for advanced relay-aided cellular networks is proposed
- …