520 research outputs found

    Secret Key Generation Based on AoA Estimation for Low SNR Conditions

    Full text link
    In the context of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. Therefore an accurate estimation of this characteristic is the core for reliable secret key generation. Estimation of almost all the existing physical layer characteristic suffer dramatically at low signal to noise (SNR) levels. In this paper, we propose a novel secret key generation algorithm that is based on the estimated angle of arrival (AoA) between the two legitimate nodes. Our algorithm has an outstanding performance at very low SNR levels. Our algorithm can exploit either the Azimuth AoA to generate the secret key or both the Azimuth and Elevation angles to generate the secret key. Exploiting a second common source of randomness adds an extra degree of freedom to the performance of our algorithm. We compare the performance of our algorithm to the algorithm that uses the most commonly used characteristics of the physical layer which are channel amplitude and phase. We show that our algorithm has a very low bit mismatch rate (BMR) at very low SNR when both channel amplitude and phase based algorithm fail to achieve an acceptable BMR

    Practical Secrecy at the Physical Layer: Key Extraction Methods with Applications in Cognitive Radio

    Get PDF
    The broadcast nature of wireless communication imposes the risk of information leakage to adversarial or unauthorized receivers. Therefore, information security between intended users remains a challenging issue. Currently, wireless security relies on cryptographic techniques and protocols that lie at the upper layers of the wireless network. One main drawback of these existing techniques is the necessity of a complex key management scheme in the case of symmetric ciphers and high computational complexity in the case of asymmetric ciphers. On the other hand, physical layer security has attracted significant interest from the research community due to its potential to generate information-theoretic secure keys. In addition, since the vast majority of physical layer security techniques exploit the inherent randomness of the communication channel, key exchange is no longer mandatory. However, additive white Gaussian noise, interference, channel estimation errors and the fact that communicating transceivers employ different radio frequency (RF) chains are among the reasons that limit utilization of secret key generation (SKG) algorithms to high signal to noise ratio levels. The scope of this dissertation is to design novel secret key generation algorithms to overcome this main drawback. In particular, we design a channel based SKG algorithm that increases the dynamic range of the key generation system. In addition, we design an algorithm that exploits angle of arrival (AoA) as a common source of randomness to generate the secret key. Existing AoA estimation systems either have high hardware and computation complexities or low performance, which hinder their incorporation within the context of SKG. To overcome this challenge, we design a novel high performance yet simple and efficient AoA estimation system that fits the objective of collecting sequences of AoAs for SKG. Cognitive radio networks (CRNs) are designed to increase spectrum usage efficiency by allowing secondary users (SUs) to exploit spectrum slots that are unused by the spectrum owners, i.e., primary users (PUs). Hence, spectrum sensing (SS) is essential in any CRN. CRNs can work both in opportunistic (interweaved) as well as overlay and/or underlay (limited interference) fashions. CRNs typically operate at low SNR levels, particularly, to support overlay/underlay operations. Similar to other wireless networks, CRNs are susceptible to various physical layer security attacks including spectrum sensing data falsification and eavesdropping. In addition to the generalized SKG methods provided in this thesis and due to the peculiarity of CRNs, we further provide a specific method of SKG for CRNs. After studying, developing and implementing several SS techniques, we design an SKG algorithm that exploits SS data. Our algorithm does not interrupt the SS operation and does not require additional time to generate the secret key. Therefore, it is suitable for CRNs

    Unleashing the secure potential of the wireless physical layer: Secret key generation methods

    Get PDF
    AbstractWithin the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from eavesdroppers. In this paper, we survey the most recent common sources of randomness used to generate the secret key. We present the steps used to extract the secret key from the estimated common source of randomness. We describe the metrics used to evaluate the strength of the generated key. We follow that with a qualitative comparison between different common sources of randomness along with a proposed new direction which capitalizes on hybridization of sources of randomness. We conclude by a discussion about current open research problems in secret key generation

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Enhanced Performance Cooperative Localization Wireless Sensor Networks Based on Received-Signal-Strength Method and ACLM

    Get PDF
    There has been a rise in research interest in wireless sensor networks (WSNs) due to the potential for his or her widespread use in many various areas like home automation, security, environmental monitoring, and lots more. Wireless sensor network (WSN) localization is a very important and fundamental problem that has received a great deal of attention from the WSN research community. Determining the relative coordinate of sensor nodes within the network adds way more aiming to sense data. The research community is extremely rich in proposals to deal with this challenge in WSN. This paper explores the varied techniques proposed to deal with the acquisition of location information in WSN. In the study of the research paper finding the performance in WSN and those techniques supported the energy consumption in mobile nodes in WSN, needed to implement the technique and localization accuracy (error rate) and discuss some open issues for future research. The thought behind Internet of things is that the interconnection of the Internet-enabled things or devices to every other and human to realize some common goals. WSN localization is a lively research area with tons of proposals in terms of algorithms and techniques. Centralized localization techniques estimate every sensor node's situation on a network from a central Base Station, finding absolute or relative coordinates (positioning) with or without a reference node, usually called the anchor (beacon) node. Our proposed method minimization error rate and finding the absolute position of nodes

    Error Minimization in Indoor Wireless Sensor Network Localization Using Genetic Technique

    Get PDF
    Using the genetic technique, error minimisation in indoor wireless sensor network localisation improves indoor wireless sensor network localisation during this field research. Sensor localisation-based techniques; several wireless device network applications require awareness of each node's physical location. The discovery of the position complete utilising range measurements also as sensor localisation received signal strength in time of arrival and sensor localisation received signal strength in a time difference of arrival and angle of arrival. WSN in positioning algorithms like the angle of arrival between two neighbour nodes. A wireless sensor network using positioning techniques in the area is assumed as localisation. WSNs always operate in an unattended manner, various situations like dynamic situations in the wireless network. It's impossible to exchange sensor manner after deployment. Therefore, a fundamental objective is to optimise the sensor manner lifetime. There has been much specialising in mobile sensor networks, and we have even seen the event of small-profile sensing devices that are ready to control their movement. Although it's been shown that mobility alleviates several issues regarding sensor network coverage and connectivity, many challenges remain node localisation in wireless device network is extremely important for several applications and received signal strength indicator has the capability of sensing, actuating the environmental data the actual-time and favourable information are often collected using the sensor in WSN systems. WSN is often combined with the internet of things to permit the association and extensive access to sensor data, and genetic techniques search the position of the nodes in WSN using all anchor nodes. A proposed algorithm as a genetic technique supported received signal strength, angle of arrival, receptive wireless device and also localisation wireless network. In the study, this paper problem that accuracy is low and error more, but the proposed algorithm overcomes this problem and minimises the error rate. Finally, the simplest possible location satisfies each factor with a minimal error rate and absolute best solution using GA

    Dead Reckoning Localization Technique for Mobile Wireless Sensor Networks

    Full text link
    Localization in wireless sensor networks not only provides a node with its geographical location but also a basic requirement for other applications such as geographical routing. Although a rich literature is available for localization in static WSN, not enough work is done for mobile WSNs, owing to the complexity due to node mobility. Most of the existing techniques for localization in mobile WSNs uses Monte-Carlo localization, which is not only time-consuming but also memory intensive. They, consider either the unknown nodes or anchor nodes to be static. In this paper, we propose a technique called Dead Reckoning Localization for mobile WSNs. In the proposed technique all nodes (unknown nodes as well as anchor nodes) are mobile. Localization in DRLMSN is done at discrete time intervals called checkpoints. Unknown nodes are localized for the first time using three anchor nodes. For their subsequent localizations, only two anchor nodes are used. The proposed technique estimates two possible locations of a node Using Bezouts theorem. A dead reckoning approach is used to select one of the two estimated locations. We have evaluated DRLMSN through simulation using Castalia simulator, and is compared with a similar technique called RSS-MCL proposed by Wang and Zhu .Comment: Journal Paper, IET Wireless Sensor Systems, 201

    Location Estimation in Wireless Communication Systems

    Get PDF
    Localization has become a key enabling technology in many emerging wireless applications and services. One of the most challenging problems in wireless localization technologies is that the performance is easily affected by the signal propagation environment. When the direct path between transmitter and receiver is obstructed, the signal measurement error for the localization process will increase significantly. Considering this problem, we first propose a novel algorithm which can automatically detect and remove the obstruction and improve the localization performance in complex environment. Besides the environmental dependency, the accuracy of target location estimation is highly sensitive to the positions of reference nodes. In this thesis, we also study on the reference node placement, and derive an optimum deployment scheme which can provide the best localization accuracy. Another challenge of wireless localization is due to insufficient number of reference nodes available in the target\u27s communication range. In this circumstance, we finally utilize the internal sensors in today\u27s smartphones to provide additional information for localization purpose, and propose a novel algorithm which can combine the location dependent parameters measured from sensors and available reference nodes together. The combined localization algorithm can overcome the error accumulation from sensor with the help of only few number of reference nodes
    • …
    corecore