44 research outputs found

    Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things

    Full text link
    Securing the Internet of Things (IoT) is a necessary milestone toward expediting the deployment of its applications and services. In particular, the functionality of the IoT devices is extremely dependent on the reliability of their message transmission. Cyber attacks such as data injection, eavesdropping, and man-in-the-middle threats can lead to security challenges. Securing IoT devices against such attacks requires accounting for their stringent computational power and need for low-latency operations. In this paper, a novel deep learning method is proposed for dynamic watermarking of IoT signals to detect cyber attacks. The proposed learning framework, based on a long short-term memory (LSTM) structure, enables the IoT devices to extract a set of stochastic features from their generated signal and dynamically watermark these features into the signal. This method enables the IoT's cloud center, which collects signals from the IoT devices, to effectively authenticate the reliability of the signals. Furthermore, the proposed method prevents complicated attack scenarios such as eavesdropping in which the cyber attacker collects the data from the IoT devices and aims to break the watermarking algorithm. Simulation results show that, with an attack detection delay of under 1 second the messages can be transmitted from IoT devices with an almost 100% reliability.Comment: 6 pages, 9 figure

    Distribution of Cell Area in Bounded Poisson Voronoi Tessellations with Application to Secure Local Connectivity

    Get PDF
    Poisson Voronoi tessellations have been used in modeling many types of systems across different sciences, from geography and astronomy to telecommunications. The existing literature on the statistical properties of Poisson Voronoi cells is vast, however, little is known about the properties of Voronoi cells located close to the boundaries of a compact domain. In a domain with boundaries, some Voronoi cells would be naturally clipped by the boundary, and the cell area falling inside the deployment domain would have different statistical properties as compared to those of non-clipped Voronoi cells located in the bulk of the domain. In this paper, we consider the planar Voronoi tessellation induced by a homogeneous Poisson point process of intensity λ ⁣> ⁣0\lambda\!>\!0 in a quadrant, where the two half-axes represent boundaries. We show that the mean cell area is less than λ1\lambda^{-1} when the seed is located exactly at the boundary, and it can be larger than λ1\lambda^{-1} when the seed lies close to the boundary. In addition, we calculate the second moment of cell area at two locations for the seed: (i) at the corner of a quadrant, and (ii) at the boundary of the half-plane. We illustrate that the two-parameter Gamma distribution, with location-dependent parameters calculated using the method of moments, can be of use in approximating the distribution of cell area. As a potential application, we use the Gamma approximations to study the degree distribution for secure connectivity in wireless sensor networks deployed over a domain with boundaries.Comment: to be publishe

    On the Interference Alignment Designs for Secure Multiuser MIMO Systems

    Full text link
    In this paper, we propose two secure multiuser multiple-input multiple-output transmission approaches based on interference alignment (IA) in the presence of an eavesdropper. To deal with the information leakage to the eavesdropper as well as the interference signals from undesired transmitters (Txs) at desired receivers (Rxs), our approaches aim to design the transmit precoding and receive subspace matrices to minimize both the total inter-main-link interference and the wiretapped signals (WSs). The first proposed IA scheme focuses on aligning the WSs into proper subspaces while the second one imposes a new structure on the precoding matrices to force the WSs to zero. When the channel state information is perfectly known at all Txs, in each proposed IA scheme, the precoding matrices at Txs and the receive subspaces at Rxs or the eavesdropper are alternatively selected to minimize the cost function of an convex optimization problem for every iteration. We provide the feasible conditions and the proofs of convergence for both IA approaches. The simulation results indicate that our two IA approaches outperform the conventional IA algorithm in terms of average secrecy sum rate.Comment: Updated version, updated author list, accepted to be appear in IEICE Transaction

    The Role of Physical Layer Security in IoT: A Novel Perspective

    Get PDF
    This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard). As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems

    Wireless channel-based ciphering key generation: effect of aging and treatment

    Get PDF
    Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the conventional method, the randomness improvement is significant at each time interval. The simulation results show that the proposed method improves the randomness of the encrypting keys
    corecore