Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–31 of 31 results for author: Chorti, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.12874  [pdf, ps, other

    eess.SP cs.CR

    Physical Layer Authentication Using Information Reconciliation

    Authors: Atsu Kokuvi Angélo Passah, Rodrigo C. de Lamare, Arsenia Chorti

    Abstract: User authentication in future wireless communication networks is expected to become more complicated due to their large scale and heterogeneity. Furthermore, the computational complexity of classical cryptographic approaches based on public key distribution can be a limiting factor for using in simple, low-end Internet of things (IoT) devices. This paper proposes physical layer authentication (PLA… ▽ More

    Submitted 19 April, 2024; originally announced April 2024.

  2. arXiv:2311.07492  [pdf, other

    cs.RO cs.MA cs.NI eess.SY

    How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems

    Authors: Stephanie Gil, Michal Yemini, Arsenia Chorti, Angelia Nedić, H. Vincent Poor, Andrea J. Goldsmith

    Abstract: Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and security. The unique characteristics of these systems prompt a reevaluation of their security concepts, including their vulnerabilities, and mechanisms to mitigate these vulnerabilities. This survey paper examines how advancement in wireless networking, coupled with the sensing and computing in cyberphysical s… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  3. arXiv:2310.14624  [pdf, other

    cs.CR

    Joint secure communication and sensing in 6G networks

    Authors: Miroslav Mitev, Amitha Mayya, Arsenia Chorti

    Abstract: Joint communication and sensing is expected to be one of the features introduced by the sixth-generation (6G) wireless systems. This will enable a huge variety of new applications, hence, it is important to find suitable approaches to secure the exchanged information. Conventional security mechanisms may not be able to meet the stringent delay, power, and complexity requirements which opens the ch… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

  4. arXiv:2305.09251  [pdf, other

    cs.CR

    A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack

    Authors: Amitha Mayya, Miroslav Mitev, Arsenia Chorti, Gerhard Fettweis

    Abstract: Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret key generation (SKG) from wireless fading coefficients during the channel's coherence time. As opposed to other works, where only specific parts of the protocol are typically investigated, here, we implem… ▽ More

    Submitted 18 May, 2023; v1 submitted 16 May, 2023; originally announced May 2023.

  5. arXiv:2305.04540  [pdf, other

    cs.CR

    Physical Layer Secret Key Generation with Kalman Filter Detrending

    Authors: Miroslav Mitev, Arsenia Chorti, Gerhard Fettweis

    Abstract: The massive deployment of low-end wireless Internet of things (IoT) devices opens the challenge of finding de-centralized and lightweight alternatives for secret key distribution. A possible solution, coming from the physical layer, is the secret key generation (SKG) from channel state information (CSI) during the channel's coherence time. This work acknowledges the fact that the CSI consists of d… ▽ More

    Submitted 22 May, 2023; v1 submitted 8 May, 2023; originally announced May 2023.

  6. arXiv:2212.00427  [pdf, other

    cs.CR

    What Physical Layer Security Can Do for 6G Security

    Authors: Miroslav Mitev, Arsenia Chorti, H. V. Poor, Gerhard Fettweis

    Abstract: While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, s… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

  7. arXiv:2210.13261  [pdf, other

    cs.CR

    Physical Layer Security -- from Theory to Practice

    Authors: Miroslav Mitev, Thuy M. Pham, Arsenia Chorti, Andre Noll Barreto, Gerhard Fettweis

    Abstract: A large spectrum of technologies are collectively dubbed as physical layer security (PLS), ranging from wiretap coding, secret key generation (SKG), authentication using physical unclonable functions (PUFs), localization / RF fingerprinting, anomaly detection monitoring the physical layer (PHY) and hardware. Despite the fact that the fundamental limits of PLS have long been characterized, incorpor… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

  8. arXiv:2206.00332  [pdf, other

    eess.SP cs.CR cs.IT

    Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation

    Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti, Mahdi Shakiba Herfeh, Muhammad K. Shehzad, Philippe Sehier

    Abstract: While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, deterministic / stochastic process, we propose a power domain decomposition that allows performing the two tasks simultaneously. We devise intelligent pre-processi… ▽ More

    Submitted 1 June, 2022; originally announced June 2022.

  9. arXiv:2205.01552  [pdf

    eess.SP cs.CR

    Physical Layer Security for 6G Systems why it is needed and how to make it happen

    Authors: Arsenia Chorti

    Abstract: Sixth generations (6G) systems will be required to meet diverse constraints in an integrated ground-air-space global network. In particular, meeting overly aggressive latency constraints, operating in massive connectivity regimes, with low energy footprint and low computational effort, while providing explicit security guarantees, can be challenging. In this setting, quality of security (QoSec) is… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

  10. arXiv:2112.09411  [pdf

    cs.CR

    Towards Intelligent Context-Aware 6G Security

    Authors: André N. Barreto, Stefan Köpsell, Arsenia Chorti, Bertram Poettering, Jens Jelitto, Julia Hesse, Jonathan Boole, Konrad Rieck, Marios Kountouris, Dave Singelee, Kumar Ashwinee

    Abstract: Imagine interconnected objects with embedded artificial intelligence (AI), empowered to sense the environment, see it, hear it, touch it, interact with it, and move. As future networks of intelligent objects come to life, tremendous new challenges arise for security, but also new opportunities, allowing to address current, as well as future, pressing needs. In this paper we put forward a roadmap t… ▽ More

    Submitted 17 December, 2021; originally announced December 2021.

  11. arXiv:2110.15415  [pdf, other

    cs.IT cs.AI cs.CR

    On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

    Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti

    Abstract: This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret ke… ▽ More

    Submitted 28 October, 2021; originally announced October 2021.

  12. arXiv:2105.10747  [pdf, other

    cs.IT eess.SP

    Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels

    Authors: Mahdi Shakiba-Herfeh, Laura Luzzi, Arsenia Chorti

    Abstract: In this paper, we consider a semi-deterministic wiretap channel where the main channel is noiseless and the eavesdropper's channel is a binary erasure channel (BEC). We provide a lower bound for the achievable secrecy rates of polar and Reed Muller codes and compare it to the second order coding rate for the semi-deterministic wiretap channel. To the best of our knowledge, this is the first work w… ▽ More

    Submitted 22 May, 2021; originally announced May 2021.

  13. arXiv:2103.02306  [pdf, ps, other

    eess.SP cs.IT

    Rate Analysis and Deep Neural Network Detectors for SEFDM FTN Systems

    Authors: Arsenia Chorti, David Picard

    Abstract: In this work we compare the capacity and achievable rate of uncoded faster than Nyquist (FTN) signalling in the frequency domain, also referred to as spectrally efficient FDM (SEFDM). We propose a deep residual convolutional neural network detector for SEFDM signals in additive white Gaussian noise channels, that allows to approach the Mazo limit in systems with up to 60 subcarriers. Notably, the… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

  14. arXiv:2103.01262  [pdf, other

    cs.CR eess.SP

    Centralized and Distributed Intrusion Detection for Resource Constrained Wireless SDN Networks

    Authors: Gustavo A. Nunez Segura, Arsenia Chorti, Cintia Borges Margi

    Abstract: Software-defined networking (SDN) was devised to simplify network management and automate infrastructure sharing in wired networks. These benefits motivated the application of SDN in wireless sensor networks to leverage solutions for complex applications. However, some of the core SDN traits turn the networks prone to denial of service attacks (DoS). There are proposals in the literature to detect… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

  15. arXiv:2101.01536  [pdf, other

    cs.CR eess.SP

    Context-Aware Security for 6G Wireless The Role of Physical Layer Security

    Authors: Arsenia Chorti, Andre Noll Barreto, Stefan Kopsell, Marco Zoli, Marwa Chafii, Philippe Sehier, Gerhard Fettweis, H. Vincent Poor

    Abstract: Sixth generation systems are expected to face new security challenges, while opening up new frontiers towards context awareness in the wireless edge. The workhorse behind this projected technological leap will be a whole new set of sensing capabilities predicted for 6G devices, in addition to the ability to achieve high precision localization. The combination of these enhanced traits can give rise… ▽ More

    Submitted 18 May, 2022; v1 submitted 5 January, 2021; originally announced January 2021.

    Comments: arXiv admin note: text overlap with arXiv:2011.07323

  16. arXiv:2011.07323  [pdf

    cs.CR

    Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless

    Authors: Arsenia Chorti

    Abstract: While the security literature predominantly focuses on the core network, the enhancement of the security of the beyond fifth generation (B5G) access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not yet been fully addressed. In parallel as we move gradually away from the standard client-server n… ▽ More

    Submitted 14 November, 2020; originally announced November 2020.

  17. arXiv:2011.00612  [pdf, other

    cs.NI

    5G New Radio Resource Allocation Optimization for Heterogeneous Services

    Authors: Nasim Ferdosian, Sara Berri, Arsenia Chorti

    Abstract: 5G new radio (NR) introduced flexible numerology to provide the necessary flexibility for multiplexing the communication of heterogeneous services on a shared channel. One of the fundamental challenges of 5G NR is to develop resource allocation schemes to efficiently exploit such flexibility to optimize resource allocation of ultra-reliable low-latency communications (URLLC) in coexistence with en… ▽ More

    Submitted 1 November, 2020; originally announced November 2020.

  18. Multi-factor Physical Layer Security Authentication in Short Blocklength Communication

    Authors: Miroslav Mitev, Mahdi Shekiba-Herfeh, Arsenia Chorti, Martin Reed

    Abstract: Lightweight and low latency security schemes at the physical layer that have recently attracted a lot of attention include: (i) physical unclonable functions (PUFs), (ii) localization based authentication, and, (iii) secret key generation (SKG) from wireless fading coefficients. In this paper, we focus on short blocklengths and propose a fast, privacy preserving, multi-factor authentication protoc… ▽ More

    Submitted 24 February, 2021; v1 submitted 27 October, 2020; originally announced October 2020.

  19. arXiv:2007.13919  [pdf, ps, other

    cs.IT

    Asymptotic Performance Analysis of NOMA Uplink Networks Under Statistical QoS Delay Constraints

    Authors: Mouktar Bello, Arsenia Chorti, Inbar Fijalkow, Wenjuan Yu, Leila Musavian

    Abstract: In this paper, we study the performance of an uplink non-orthogonal multiple access (NOMA) network under statistical quality of service (QoS) delay constraints, captured through each user s effective capacity (EC). We first propose novel closed-form expressions for the EC in a two-user NOMA network and show that in the high signal-to-noise ratio (SNR) region, the 'strong' NOMA user, referred to as… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: 13 pages, 17 figures. Part of this work was presented [arXiv:2003.04758] at IEEE international conference on communications (ICC) 2020, and new results were added to produce this new contribution

  20. arXiv:2004.11226  [pdf, ps, other

    eess.SP cs.IT

    Performance Analysis of Uplink NOMA-Relevant Strategy Under Statistical Delay QoS Constraints

    Authors: Mylene Pischella, Arsenia Chorti, Inbar Fijalkow

    Abstract: A new multiple access (MA) strategy, referred to as non orthogonal multiple access - Relevant (NOMA-R), allows selecting NOMA when this increases all individual rates, i.e., it is beneficial for both strong(er) and weak(er) individual users. This letter provides a performance analysis of the NOMA-R strategy in uplink networks with statistical delay constraints. Closed-form expressions of the effec… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

  21. arXiv:2003.12034  [pdf, ps, other

    cs.CR cs.IT

    Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation

    Authors: Miroslav Mitev, Arsenia Chorti, E. Veronica Belmega, Martin Reed

    Abstract: Wireless secret key generation (W-SKG) from shared randomness (e.g., from the wireless channel fading realizations), is a well established scheme that can be used for session key agreement. W-SKG approaches can be of particular interest in delay constrained wireless networks and notably in the context of ultra reliable low latency communications (URLLC) in beyond fifth generation (B5G) systems. Ho… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

  22. arXiv:2003.12027  [pdf, ps, other

    cs.CR cs.NI

    Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks

    Authors: Gustavo A. Nunez Segura, Sotiris Skaperas, Arsenia Chorti, Lefteris Mamatas, Cintia Borges Margi

    Abstract: Software-defined networking (SDN) is a promising technology to overcome many challenges in wireless sensor networks (WSN), particularly with respect to flexibility and reuse. Conversely, the centralization and the planes' separation turn SDNs vulnerable to new security threats in the general context of distributed denial of service (DDoS) attacks. State-of-the-art approaches to identify DDoS do no… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

  23. arXiv:2003.04758  [pdf, ps, other

    cs.IT

    Performance Analysis of NOMA Uplink Networks under Statistical QoS Delay Constraints

    Authors: Mouktar Bello, Wenjuan Yu, Arsenia Chorti, Leila Musavian

    Abstract: In the fifth generation and beyond (B5G), delayconstraints emerge as a topic of particular interest, e.g. forultra-reliable low latency communications (URLLC) such asautonomous vehicles and enhanced reality. In this paper, westudythe performance of a two-user uplink NOMA network understatistical quality of service (QoS) delay constraints, capturedthrough each user s effective capacity (EC). We pro… ▽ More

    Submitted 9 March, 2020; originally announced March 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:2001.11423

  24. arXiv:2001.10637  [pdf, other

    eess.SP cs.IT

    Flexible Multiple Access Enabling Low-Latency Communications: Introducing NOMA-R

    Authors: Mouktar Bello, Wenjuan Yu, Mylene Pischella, Arsenia Chorti, Inbar Fijalkow, Leila Musavian

    Abstract: Various verticals in 5G and beyond (B5G) networks require very stringent latency guarantees, while at the same time envisioning massive connectivity. As a result, choosing the optimal multiple access (MA) technique to achieve low latency is a key enabler of B5G. In particular, this issue is more acute in uplink transmissions due to the potentially high number of collisions. On this premise, in the… ▽ More

    Submitted 28 January, 2020; originally announced January 2020.

  25. arXiv:2001.07162  [pdf, ps, other

    cs.CR

    Authenticated Secret Key Generation in Delay Constrained Wireless Systems

    Authors: Miroslav Mitev, Arsenia Chorti, Martin Reed, Leila Musavian

    Abstract: With the emergence of 5G low latency applications, such as haptics and V2X, low complexity and low latency security mechanisms are sought. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework we propose i) a novel authenticated encryption using SKG; ii) a combined PUF / SKG… ▽ More

    Submitted 26 March, 2020; v1 submitted 20 January, 2020; originally announced January 2020.

  26. arXiv:2001.07153  [pdf, ps, other

    cs.IT

    Physical Layer Security: Authentication, Integrity and Confidentiality

    Authors: Mahdi Shakiba-Herfeh, Arsenia Chorti, H. Vince Poor

    Abstract: The goal of physical layer security (PLS) is to make use of the properties of the physical layer, including the wireless communication medium and the transceiver hardware, to enable critical aspects of secure communications. In particular, PLS can be employed to provide i) node authentication, ii) message authentication, and, iii) message confidentiality. Unlike the corresponding classical cryptog… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

  27. arXiv:1901.03543  [pdf, ps, other

    cs.CR cs.GT cs.IT eess.SP

    Mitigating Jamming Attacks Using Energy Harvesting

    Authors: Gada Rezgui, E. Veronica Belmega, Arsenia Chorti

    Abstract: The use of energy harvesting as a counter-jamming measure is investigated on the premise that part of the harmful interference can be harvested to increase the transmit power. We formulate the strategic interaction between a pair of legitimate nodes and a malicious jammer as a zero-sum game. Our analysis demonstrates that the legitimate nodes are able to neutralize the jammer. However, this policy… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

  28. arXiv:1507.01098  [pdf, ps, other

    cs.IT

    Perfect Secrecy in Physical Layer Network Coding Systems from Structured Interference

    Authors: David Karpuk, Arsenia Chorti

    Abstract: Physical layer network coding (PNC) has been proposed for next generation networks. In this contribution, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite and uniform signal input distributions we propose upper bounds (UBs) on the achievable perf… ▽ More

    Submitted 1 February, 2016; v1 submitted 4 July, 2015; originally announced July 2015.

  29. arXiv:1502.06007  [pdf, ps, other

    cs.IT math.AG

    Degrees of Freedom and Secrecy in Wireless Relay Networks

    Authors: Arsenia Chorti, Ragnar Freij, David Karpuk

    Abstract: We translate the problem of designing a secure communications protocol for several users communicating through a relay in a wireless network into understanding certain subvarieties of products of Grassmannians. We calculate the dimension of these subvarieties and provide various results concerning their defning equations. When the relay and all of the users have the same number of antennas, this a… ▽ More

    Submitted 12 December, 2014; originally announced February 2015.

    Comments: Submitted to MEGA (Effective Methods in Algebraic Geometry) 2015

  30. arXiv:1407.0915  [pdf, ps, other

    cs.CR cs.IT

    Strong Secrecy in Wireless Network Coding Systems with M-QAM Modulators

    Authors: Arsenia Chorti, Mehdi M. Molu, David Karpuk, Camilla Hollanti, Alister Burr

    Abstract: We investigate the possibility of developing physical layer network coding (PNC) schemes with embedded strong secrecy based on standard QAM modulators. The proposed scheme employs a triple binning approach at the QAM front-end of the wireless PNC encoders. A constructive example of a strong secrecy encoder is presented when a BPSK and an 8-PAM modulator are employed at the wireless transmitters an… ▽ More

    Submitted 3 July, 2014; originally announced July 2014.

    Comments: submitted to ICCC 2014

  31. arXiv:1401.6790  [pdf, ps, other

    cs.IT cs.CR

    Optimal Power Allocation in Block Fading Gaussian Channels with Causal CSI and Secrecy Constraints

    Authors: Arsenia Chorti, Katerina Papadaki, H. Vincent Poor

    Abstract: The optimal power allocation that maximizes the secrecy capacity of block fading Gaussian (BF-Gaussian) networks with causal channel state information (CSI), M-block delay tolerance and a frame based power constraint is examined. In particular, we formulate the secrecy capacity maximization as a dynamic program. We propose suitable linear approximations of the secrecy capacity density in the low S… ▽ More

    Submitted 27 January, 2014; originally announced January 2014.

    Comments: submitted to ISIT 2014