581 research outputs found
Low-power Secret-key Agreement over OFDM
Information-theoretic secret-key agreement is perhaps the most practically
feasible mechanism that provides unconditional security at the physical layer
to date. In this paper, we consider the problem of secret-key agreement by
sharing randomness at low power over an orthogonal frequency division
multiplexing (OFDM) link, in the presence of an eavesdropper. The low power
assumption greatly simplifies the design of the randomness sharing scheme, even
in a fading channel scenario. We assess the performance of the proposed system
in terms of secrecy key rate and show that a practical approach to key sharing
is obtained by using low-density parity check (LDPC) codes for information
reconciliation. Numerical results confirm the merits of the proposed approach
as a feasible and practical solution. Moreover, the outage formulation allows
to implement secret-key agreement even when only statistical knowledge of the
eavesdropper channel is available.Comment: 9 pages, 4 figures; this is the authors prepared version of the paper
with the same name accepted for HotWiSec 2013, the Second ACM Workshop on Hot
Topics on Wireless Network Security and Privacy, Budapest, Hungary 17-19
April 201
Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission
Recently, we have developed a PHYsical layer Phase Challenge-Response
Authentication Scheme (PHY-PCRAS) for independent multicarrier transmission. In
this paper, we make a further step by proposing a novel artificial-noise-aided
PHY-PCRAS (ANA-PHY-PCRAS) for practical orthogonal frequency division
multiplexing (OFDM) transmission, where the Tikhonov-distributed artificial
noise is introduced to interfere with the phase-modulated key for resisting
potential key-recovery attacks whenever a static channel between two legitimate
users is unfortunately encountered. Then, we address various practical issues
for ANA-PHY-PCRAS with OFDM transmission, including correlation among
subchannels, imperfect carrier and timing recoveries. Among them, we show that
the effect of sampling offset is very significant and a search procedure in the
frequency domain should be incorporated for verification. With practical OFDM
transmission, the number of uncorrelated subchannels is often not sufficient.
Hence, we employ a time-separated approach for allocating enough subchannels
and a modified ANA-PHY-PCRAS is proposed to alleviate the discontinuity of
channel phase at far-separated time slots. Finally, the key equivocation is
derived for the worst case scenario. We conclude that the enhanced security of
ANA-PHY-PCRAS comes from the uncertainty of both the wireless channel and
introduced artificial noise, compared to the traditional challenge-response
authentication scheme implemented at the upper layer.Comment: 33 pages, 13 figures, submitted for possible publicatio
Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs
Optimal power allocation for orthogonal frequency division multiplexing
(OFDM) wiretap channels with Gaussian channel inputs has already been studied
in some previous works from an information theoretical viewpoint. However,
these results are not sufficient for practical system design. One reason is
that discrete channel inputs, such as quadrature amplitude modulation (QAM)
signals, instead of Gaussian channel inputs, are deployed in current practical
wireless systems to maintain moderate peak transmission power and receiver
complexity. In this paper, we investigate the power allocation and artificial
noise design for OFDM wiretap channels with discrete channel inputs. We first
prove that the secrecy rate function for discrete channel inputs is nonconcave
with respect to the transmission power. To resolve the corresponding nonconvex
secrecy rate maximization problem, we develop a low-complexity power allocation
algorithm, which yields a duality gap diminishing in the order of
O(1/\sqrt{N}), where N is the number of subcarriers of OFDM. We then show that
independent frequency-domain artificial noise cannot improve the secrecy rate
of single-antenna wiretap channels. Towards this end, we propose a novel
time-domain artificial noise design which exploits temporal degrees of freedom
provided by the cyclic prefix of OFDM systems {to jam the eavesdropper and
boost the secrecy rate even with a single antenna at the transmitter}.
Numerical results are provided to illustrate the performance of the proposed
design schemes.Comment: 12 pages, 7 figures, accepted by IEEE Transactions on Wireless
Communications, Jan. 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Exploiting Channel Diversity in Secret Key Generation from Multipath Fading Randomness
We design and analyze a method to extract secret keys from the randomness
inherent to wireless channels. We study a channel model for multipath wireless
channel and exploit the channel diversity in generating secret key bits. We
compare the key extraction methods based both on entire channel state
information (CSI) and on single channel parameter such as the received signal
strength indicators (RSSI). Due to the reduction in the degree-of-freedom when
going from CSI to RSSI, the rate of key extraction based on CSI is far higher
than that based on RSSI. This suggests that exploiting channel diversity and
making CSI information available to higher layers would greatly benefit the
secret key generation. We propose a key generation system based on low-density
parity-check (LDPC) codes and describe the design and performance of two
systems: one based on binary LDPC codes and the other (useful at higher
signal-to-noise ratios) based on four-ary LDPC codes
Sparse Signal Processing Concepts for Efficient 5G System Design
As it becomes increasingly apparent that 4G will not be able to meet the
emerging demands of future mobile communication systems, the question what
could make up a 5G system, what are the crucial challenges and what are the key
drivers is part of intensive, ongoing discussions. Partly due to the advent of
compressive sensing, methods that can optimally exploit sparsity in signals
have received tremendous attention in recent years. In this paper we will
describe a variety of scenarios in which signal sparsity arises naturally in 5G
wireless systems. Signal sparsity and the associated rich collection of tools
and algorithms will thus be a viable source for innovation in 5G wireless
system design. We will discribe applications of this sparse signal processing
paradigm in MIMO random access, cloud radio access networks, compressive
channel-source network coding, and embedded security. We will also emphasize
important open problem that may arise in 5G system design, for which sparsity
will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
The security of the Internet of Things (IoT) is receiving considerable
interest as the low power constraints and complexity features of many IoT
devices are limiting the use of conventional cryptographic techniques. This
article provides an overview of recent research efforts on alternative
approaches for securing IoT wireless communications at the physical layer,
specifically the key topics of key generation and physical layer encryption.
These schemes can be implemented and are lightweight, and thus offer practical
solutions for providing effective IoT wireless security. Future research to
make IoT-based physical layer security more robust and pervasive is also
covered
- …