12 research outputs found
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
SECURITY UNDER IMPERFECT CHANNEL KNOWLEDGE IN WIRELESS NETWORKS
This dissertation studies physical layer security in wireless networks using an information theoretic framework. The central theme of this work is exploring the effect of delayed or no channel state information (CSI) on physical layer security in various wireless channel models.
We begin with the fast Rayleigh fading wiretap channel, over which a legitimate transmitter wishes to have secure communication with a legitimate receiver in the presence of an eavesdropper. Subject to an average power constraint on the input, and with no CSI at any user, we show that the input distribution that achieves the secrecy capacity for this wiretap channel is discrete with a finite number of mass points. This enables us to evaluate the exact secrecy capacity of this channel numerically.
Next, we consider multi-user models, specifically, the wiretap channel with M helpers, the K-user multiple access wiretap channel, and the K-user interference channel with an external eavesdropper, when no eavesdropper's CSI is available at the transmitters. In each case, we establish the optimal sum secure degrees of freedom (s.d.o.f.) by providing achievable schemes and matching converses. We show that the unavailability of the eavesdropper's CSI at the transmitter (CSIT) does not reduce the s.d.o.f. of the wiretap channel with helpers. However, there is loss in s.d.o.f. for both the multiple access wiretap channel and the interference channel with an external eavesdropper. In particular, we show that in the absence of eavesdropper's CSIT, the K-user multiple access wiretap channel reduces to a wiretap channel with (K-1) helpers from a sum s.d.o.f. perspective, and the optimal sum s.d.o.f. reduces from K(K-1)/(K(K-1)+1) to (K-1)/K. For the interference channel with an external eavesdropper, the optimal sum s.d.o.f. decreases from K(K-1)/(2K-1) to (K-1)/2 in the absence of the eavesdropper's CSIT. Our results show that the lack of eavesdropper's CSIT does not have a significant impact on the optimal s.d.o.f. for any of the three channel models, especially when the number of users is large.
We, then, study multiple-input multiple-output (MIMO) multi-user channels. We begin with the case when full CSIT is available. We consider a two-user MIMO multiple access wiretap channel with N antennas at each transmitter, N antennas at the legitimate receiver, and K antennas at the eavesdropper. We determine the optimal sum s.d.o.f. for this model for all values of N and K. We subdivide our problem into several regimes based on the values of N and K, and provide achievable schemes based on real and vector space alignment techniques for fixed and fading channel gains, respectively. To prove the optimality of the achievable schemes, we provide matching converses for each regime. Our results show how the number of eavesdropper antennas affects the optimal sum s.d.o.f. of the multiple access wiretap channel.
In line with the theme of this dissertation, we next consider the MIMO wiretap channel with one helper and the two-user MIMO multiple access channel when no eavesdropper CSIT is available. In each case, the eavesdropper has K antennas while the remaining terminals have N antennas. We determine the optimal sum s.d.o.f. for each channel model for the regime K= N.
Finally, we explore the effect of delayed CSIT on physical layer security. In particular, we consider the two user multiple-input single-output (MISO) broadcast channel with confidential messages, in which the nature of CSIT from each user can be of the form I_{i}, i=1,2 where I_{i} belongs to {P, D,N}, and the forms P, D and N correspond to perfect and instantaneous, completely delayed, and no CSIT, respectively. Thus, the overall CSIT can be any of nine possible states corresponding to all possible values of (I_{1},I_{2}). While the optimal sum s.d.o.f. in the homogeneous settings corresponding to I_1=I_2 are already known in the literature, we focus on the heterogeneous settings where I_1 is not equal to I_2 and establish the optimal s.d.o.f. region in each case. We further consider the case where the CSIT state varies with time. Each state (I_1,I_2) can then occur for \lambda_{I_{1}I_{2}} fraction of the total duration. We determine the s.d.o.f. region of the MISO broadcast channel with confidential messages under such an alternating CSIT setting, with a mild symmetry assumption, where \lambda_{I_{1} I_{2}}=\lambda_{I_{2}I_{1}}
Recommended from our members
MIMO-based Friendly Jamming and Interference Management Techniques for Secure Wireless Communications
The ever-increasing growth of wireless systems has made them an essential part of our daily life. People rely heavily on wireless networks for communications and to conduct critical transactions from their mobile devices, including financial transactions, access to health records, etc. The proliferation of wireless communication devices opens the door for many security breaches, ranging from eavesdropping to jamming attacks. Such a disadvantage stems from the broadcast nature of wireless transmissions, which creates an exposed environment.
In this dissertation, we focus on eavesdropping attacks. While cryptographic techniques can be used to thwart eavesdropping attacks and enable secure wireless communications, they are not sufficient to protect the lower-layer headers of a packet (i.e., PHY and MAC headers). Hence, even though the secret message is encrypted, these unencrypted headers can be exploited by an adversary to extract invaluable information and initiate malicious attacks (e.g., traffic classification). Physical-layer (PHY-layer) security has been introduced as a promising candidate to prevent attacks that exploit unencrypted lower layer headers.
PHY-layer security techniques typically rely on injecting an intentional interference into the medium so as to confuse nearby eavesdroppers (Eve). Specifically, a legitimate transmit-receive (Alice-Bob) pair generates a bogus signal, namely friendly jamming (FJ), along with the information signal, to increase interference at Eve(s) but without affecting the legitimate receiver (Bob). Depending on which end of a legitimate link is responsible for generating the FJ signal, two types of FJ techniques exist: transmitter-based (TxFJ) and receiver-based (RxFJ).
In this dissertation, we propose to advance the state-of-art in PHY-layer security by considering multi-link scenarios, including multi-user multiple-input multiple-output (MU-MIMO) and peer-to-peer (P2P) networks. Specifically, we consider a scenario where one or more external Eve(s) attempt to snoop on communications of various links. In such networks, transmission of one link may be interfered with neighboring links' transmissions. Thus, special care must be dedicated to handling interference.
In our first contribution in this dissertation, we consider a P2P network tapped by external Eve(s) in which each Alice-Bob pair conceals its communications using TxFJ. TxFJ is realized at Alice side using MIMO precoding. The goal is to design the precoders for both information and TxFJ signals at all Alices so as to maximize a given utility (e.g., sum of communication rates) while preventing eavesdropping elsewhere. Because legitimate links do not cooperate with each other and there is no centralized authority to perform optimization, every link selfishly aims at maximizing its secrecy rate. Using non-cooperative game theory, we design a distributed method for maximizing the sum of secrecy rates. Under the exact knowledge of eavesdropping channels, we show that our distributed method has a comparable secrecy sum-rate to a centralized approach.
In our next contribution, we focus on employing practical precoders in our design for a P2P network. Specifically, we employed a zero-forcing-based (ZF-based) precoder for the TxFJ of each Alice-Bob pair in a P2P network. We also assume that each link has a certain rate demand to be satisfied. In such a scenario, even though the non-cooperative game designed for this P2P network is shown to be convergent to its unique Nash Equilibrium (NE), there is still no guarantee that the resulting NE is Pareto-optimal. Hence, we propose a modified price-based game, in which each link is penalized for generating interference on other legitimate links. We show that the price-based game converges to the Pareto-optimal point of secrecy rate region. We then leverage mixed-strategy games to provide solutions that are robust to uncertainties in knowledge of eavesdropping channels. The proposed ZF-based design of precoders is also implemented on software-defined radios to assess its performance on a single link in real-world scenarios.
In another contribution of this dissertation, we consider to further enhance the secrecy of each link in a P2P network by equipping each receiver with RxFJ. Hence, in addition to the power allocation between TxFJ and information signals, we optimize RxFJ power as well. We show that by using RxFJ at each Bob, we could leverage the well-established concept of concave games, which compared to non-convex games enjoy more simplified game-theoretic analysis. We derive sufficient conditions under which the game admits a unique NE. We also propose another version of our power control algorithm that can be implemented asynchronously, making it robust to transmission delays in the network.
In our last contribution, we consider the downlink of a MU-MIMO network in the presence of an external Eve. No knowledge of Eve's location is assumed at the access point. The network is studied in underloaded and overloaded conditions. In an underloaded (overloaded) network, the number of antennas at the access point is larger (smaller) than the total number of downlink users' antennas. In the overloaded setting, traditional methods of creating TxFJ, such as ZF-based methods, are infeasible. We propose a linear precoding scheme that relaxes such infeasibility in overloaded MU-MIMO networks. In the worst-case scenario where Eve has knowledge of the channels between access point and downlink users, we show that our method imposes the most stringent condition on the number of antennas required at Eve to cancel out TxFJ signals. We also show that choosing the number of independent streams to be sent to downlink users has an important role in achieving a tradeoff between security, reliability, and the achievable rate
Securing internet of medical things with friendly-jamming schemes
The Internet of Medical Things (IoMT)-enabled e-healthcare can complement traditional medical treatments in a flexible and convenient manner. However, security and privacy become the main concerns of IoMT due to the limited computational capability, memory space and energy constraint of medical sensors, leading to the in-feasibility for conventional cryptographic approaches, which are often computationally-complicated. In contrast to cryptographic approaches, friendly jamming (Fri-jam) schemes will not cause extra computing cost to medical sensors, thereby becoming potential countermeasures to ensure security of IoMT. In this paper, we present a study on using Fri-jam schemes in IoMT. We first analyze the data security in IoMT and discuss the challenges. We then propose using Fri-jam schemes to protect the confidential medical data of patients collected by medical sensors from being eavesdropped. We also discuss the integration of Fri-jam schemes with various communication technologies, including beamforming, Simultaneous Wireless Information and Power Transfer (SWIPT) and full duplexity. Moreover, we present two case studies of Fri-jam schemes in IoMT. The results of these two case studies indicate that the Fri-jam method will significantly decrease the eavesdropping risk while leading to no significant influence on legitimate transmission
Wireless Communication Networks Powered by Energy Harvesting
This thesis focuses on the design, analysis and optimization of
various energy-constrained wireless communication systems powered
by energy harvesting (EH). In particular, we consider ambient EH
wireless sensor networks, wireless power transfer (WPT) assisted
secure communication network, simultaneous wireless information
and power transfer (SWIPT) systems, and WPT-based backscatter
communication (BackCom) systems.
First, we study the delay issue in ambient EH wireless sensor
network for status monitoring application scenarios. Unlike most
existing studies on the delay performance of EH sensor networks
that only consider the energy consumption of transmission, we
consider the energy costs of both sensing and transmission. To
comprehensively study the delay performance, we consider two
complementary metrics and analyze their statistics: (i) update
age - measuring how timely the updated information at the sink
is, and (ii) update cycle - measuring how frequently the
information at the sink is updated. We show that the
consideration of sensing energy cost leads to an important
tradeoff between the two metrics: more frequent updates result in
less timely information available at the sink.
Second, we study WPT-assisted secure communication network.
Specifically, we propose to use a wireless-powered friendly
jammer to enable low-complexity secure communication between a
source node and a destination node, in the presence of an
eavesdropper. We propose a WPT-assisted secure communication
protocol, and analytically characterize its long-term behavior.
We further optimize the encoding-rate parameters for maximizing
the throughput subject to a secrecy outage probability
constraint. We show that the throughput performance differs
fundamentally between the single-antenna jammer case and the
multi-antenna jammer case.
Third, exploiting the fact that the radio-frequency (RF) signal
can carry both information and energy, we study a point-to-point
simultaneous wireless information and power transfer (SWIPT)
system adopting practical M-ary modulation for both the
power-splitting (PS) and the time-switching (TS) receiver
architectures. Unlike most existing studies, we take into account
the receiver’s sensitivity level of the RF-EH circuit. We show
several interesting results, such as for the PS scheme,
modulations with high peak-to-average power ratio achieve better
EH performance. Then, inspired by the PS-based SWIPT receiver, we
propose a novel information receiver, which involves joint
processing of coherently and non-coherently received signals, and
hence, creates a three-dimensional received signal space. We show
that the achievable rate of a splitting receiver provides a 50%
rate gain compared to either the conventional coherent or
non-coherent receiver in the high SNR regime.
Last, we propose the design of WPT-based full-duplex backscatter
communication (BackCom) networks for energy-constrained
Internet-of-Things applications, where a novel multiple-access
scheme based on time-hopping spread-spectrum (TH-SS) is designed
to enable both one-way power transfer and two-way information
transmission in coexisting backscatter reader-tag links.
Comprehensive performance analysis of BackCom networks is
presented. We show some interesting design insights, such as: a
longer TH-SS sequence reduces the bit error rates (BERs) of the
two-way information transmission but results in lower
energy-harvesting rate at the tag; a larger number of BackCom
links improves the energy-harvesting rate at the tags but also
increase the BERs for the information transmission
Secure Degree of Freedom of Wireless Networks Using Collaborative Pilots
A wireless network of full-duplex nodes/users, using anti-eavesdropping
channel estimation (ANECE) based on collaborative pilots, can yield a positive
secure degree-of-freedom (SDoF) regardless of the number of antennas an
eavesdropper may have. This paper presents novel results on SDoF of ANECE by
analyzing secret-key capacity (SKC) of each pair of nodes in a network of
multiple collaborative nodes per channel coherence period. Each transmission
session of ANECE has two phases: phase 1 is used for pilots, and phase 2 is
used for random symbols. This results in two parts of SDoF of ANECE. Both lower
and upper bounds on the SDoF of ANECE for any number of users are shown, and
the conditions for the two bounds to meet are given. This leads to important
discoveries, including: a) The phase-1 SDoF is the same for both multi-user
ANECE and pair-wise ANECE while the former may require only a fraction of the
number of time slots needed by the latter; b) For a three-user network, the
phase-2 SDoF of all-user ANECE is generally larger than that of pair-wise
ANECE; c) For a two-user network, a modified ANECE deploying square-shaped
nonsingular pilot matrices yields a higher total SDoF than the original ANECE.
The multi-user ANECE and the modified two-user ANECE shown in this paper appear
to be the best full-duplex schemes known today in terms of SDoF subject to each
node using a given number of antennas for both transmitting and receiving
6G Wireless Systems: Vision, Requirements, Challenges, Insights, and Opportunities
Mobile communications have been undergoing a generational change every ten
years or so. However, the time difference between the so-called "G's" is also
decreasing. While fifth-generation (5G) systems are becoming a commercial
reality, there is already significant interest in systems beyond 5G, which we
refer to as the sixth-generation (6G) of wireless systems. In contrast to the
already published papers on the topic, we take a top-down approach to 6G. We
present a holistic discussion of 6G systems beginning with lifestyle and
societal changes driving the need for next generation networks. This is
followed by a discussion into the technical requirements needed to enable 6G
applications, based on which we dissect key challenges, as well as
possibilities for practically realizable system solutions across all layers of
the Open Systems Interconnection stack. Since many of the 6G applications will
need access to an order-of-magnitude more spectrum, utilization of frequencies
between 100 GHz and 1 THz becomes of paramount importance. As such, the 6G
eco-system will feature a diverse range of frequency bands, ranging from below
6 GHz up to 1 THz. We comprehensively characterize the limitations that must be
overcome to realize working systems in these bands; and provide a unique
perspective on the physical, as well as higher layer challenges relating to the
design of next generation core networks, new modulation and coding methods,
novel multiple access techniques, antenna arrays, wave propagation,
radio-frequency transceiver design, as well as real-time signal processing. We
rigorously discuss the fundamental changes required in the core networks of the
future that serves as a major source of latency for time-sensitive
applications. While evaluating the strengths and weaknesses of key 6G
technologies, we differentiate what may be achievable over the next decade,
relative to what is possible.Comment: Accepted for Publication into the Proceedings of the IEEE; 32 pages,
10 figures, 5 table