-
Physical Layer Authentication Using Information Reconciliation
Authors:
Atsu Kokuvi Angélo Passah,
Rodrigo C. de Lamare,
Arsenia Chorti
Abstract:
User authentication in future wireless communication networks is expected to become more complicated due to their large scale and heterogeneity. Furthermore, the computational complexity of classical cryptographic approaches based on public key distribution can be a limiting factor for using in simple, low-end Internet of things (IoT) devices. This paper proposes physical layer authentication (PLA…
▽ More
User authentication in future wireless communication networks is expected to become more complicated due to their large scale and heterogeneity. Furthermore, the computational complexity of classical cryptographic approaches based on public key distribution can be a limiting factor for using in simple, low-end Internet of things (IoT) devices. This paper proposes physical layer authentication (PLA) expected to complement existing traditional approaches, e.g., in multi-factor authentication protocols. The precision and consistency of PLA is impacted because of random variations of wireless channel realizations between different time slots, which can impair authentication performance. In order to address this, a method based on error-correcting codes in the form of reconciliation is considered in this work. In particular, we adopt distributed source coding (Slepian-Wolf) reconciliation using polar codes to reconcile channel measurements spread in time. Hypothesis testing is then applied to the reconciled vectors to accept or reject the device as authenticated. Simulation results show that the proposed PLA using reconciliation outperforms prior schemes even in low signal-to-noise ratio scenarios.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
How Physicality Enables Trust: A New Era of Trust-Centered Cyberphysical Systems
Authors:
Stephanie Gil,
Michal Yemini,
Arsenia Chorti,
Angelia Nedić,
H. Vincent Poor,
Andrea J. Goldsmith
Abstract:
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and security. The unique characteristics of these systems prompt a reevaluation of their security concepts, including their vulnerabilities, and mechanisms to mitigate these vulnerabilities. This survey paper examines how advancement in wireless networking, coupled with the sensing and computing in cyberphysical s…
▽ More
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and security. The unique characteristics of these systems prompt a reevaluation of their security concepts, including their vulnerabilities, and mechanisms to mitigate these vulnerabilities. This survey paper examines how advancement in wireless networking, coupled with the sensing and computing in cyberphysical systems, can foster novel security capabilities. This study delves into three main themes related to securing multi-agent cyberphysical systems. First, we discuss the threats that are particularly relevant to multi-agent cyberphysical systems given the potential lack of trust between agents. Second, we present prospects for sensing, contextual awareness, and authentication, enabling the inference and measurement of ``inter-agent trust" for these systems. Third, we elaborate on the application of quantifiable trust notions to enable ``resilient coordination," where ``resilient" signifies sustained functionality amid attacks on multiagent cyberphysical systems. We refer to the capability of cyberphysical systems to self-organize, and coordinate to achieve a task as autonomy. This survey unveils the cyberphysical character of future interconnected systems as a pivotal catalyst for realizing robust, trust-centered autonomy in tomorrow's world.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Joint secure communication and sensing in 6G networks
Authors:
Miroslav Mitev,
Amitha Mayya,
Arsenia Chorti
Abstract:
Joint communication and sensing is expected to be one of the features introduced by the sixth-generation (6G) wireless systems. This will enable a huge variety of new applications, hence, it is important to find suitable approaches to secure the exchanged information. Conventional security mechanisms may not be able to meet the stringent delay, power, and complexity requirements which opens the ch…
▽ More
Joint communication and sensing is expected to be one of the features introduced by the sixth-generation (6G) wireless systems. This will enable a huge variety of new applications, hence, it is important to find suitable approaches to secure the exchanged information. Conventional security mechanisms may not be able to meet the stringent delay, power, and complexity requirements which opens the challenge of finding new lightweight security solutions. A promising approach coming from the physical layer is the secret key generation (SKG) from channel fading. While SKG has been investigated for several decades, practical implementations of its full protocol are still scarce. The aim of this chapter is to evaluate the SKG rates in real-life setups under a set of different scenarios. We consider a typical radar waveform and present a full implementation of the SKG protocol. Each step is evaluated to demonstrate that generating keys from the physical layer can be a viable solution for future networks. However, we show that there is not a single solution that can be generalized for all cases, instead, parameters should be chosen according to the context.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack
Authors:
Amitha Mayya,
Miroslav Mitev,
Arsenia Chorti,
Gerhard Fettweis
Abstract:
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret key generation (SKG) from wireless fading coefficients during the channel's coherence time. As opposed to other works, where only specific parts of the protocol are typically investigated, here, we implem…
▽ More
Physical layer security (PLS) is seen as the means to enhance physical layer trustworthiness in 6G. This work provides a proof-of-concept for one of the most mature PLS technologies, i.e., secret key generation (SKG) from wireless fading coefficients during the channel's coherence time. As opposed to other works, where only specific parts of the protocol are typically investigated, here, we implement the full SKG chain in four indoor experimental campaigns. In detail, we consider two legitimate nodes, who use the wireless channel to extract secret keys and a malicious node placed in the immediate vicinity of one of them, who acts as a passive eavesdropper. To estimate the final SKG rate we evaluate the conditional min-entropy by taking into account all information available at the eavesdropper. Finally, we use this paper to announce the first ever physical layer security challenge, mirroring practices in cryptography. We call the community to scrutinize the presented results and try to ``break'' our SKG implementation. To this end, we provide, i) the full dataset observed by the eavesdroppers, ii) $20$ blocks of $16-$byte long ciphertexts, encrypted using one-time pad with $20$ distilled secret keys, and, iii) all codes and software used in our SKG implementation. An attack will be considered successful if any part(s) of the plaintext are successfully retrieved.
△ Less
Submitted 18 May, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Physical Layer Secret Key Generation with Kalman Filter Detrending
Authors:
Miroslav Mitev,
Arsenia Chorti,
Gerhard Fettweis
Abstract:
The massive deployment of low-end wireless Internet of things (IoT) devices opens the challenge of finding de-centralized and lightweight alternatives for secret key distribution. A possible solution, coming from the physical layer, is the secret key generation (SKG) from channel state information (CSI) during the channel's coherence time. This work acknowledges the fact that the CSI consists of d…
▽ More
The massive deployment of low-end wireless Internet of things (IoT) devices opens the challenge of finding de-centralized and lightweight alternatives for secret key distribution. A possible solution, coming from the physical layer, is the secret key generation (SKG) from channel state information (CSI) during the channel's coherence time. This work acknowledges the fact that the CSI consists of deterministic (predictable) and stochastic (unpredictable) components, loosely captured through the terms large-scale and small-scale fading, respectively. Hence, keys must be generated using only the random and unpredictable part. To detrend CSI measurements from deterministic components, a simple and lightweight approach based on Kalman filters is proposed and is evaluated using an implementation of the complete SKG protocol (including privacy amplification that is typically missing in many published works). In our study we use a massive multiple input multiple output (mMIMO) orthogonal frequency division multiplexing outdoor measured CSI dataset. The threat model assumes a passive eavesdropper in the vicinity (at 1 meter distance or less) from one of the legitimate nodes and the Kalman filter is parameterized to maximize the achievable key rate.
△ Less
Submitted 22 May, 2023; v1 submitted 8 May, 2023;
originally announced May 2023.
-
What Physical Layer Security Can Do for 6G Security
Authors:
Miroslav Mitev,
Arsenia Chorti,
H. V. Poor,
Gerhard Fettweis
Abstract:
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, s…
▽ More
While existing security protocols were designed with a focus on the core network, the enhancement of the security of the B5G access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not been fully addressed. This work is articulated around the premise that rethinking the security design bottom up, starting at the physical layer, is not only viable in 6G but importantly, arises as an efficient way to overcome security hurdles in novel use cases, notably massive machine type communications (mMTC), ultra reliable low latency communications (URLLC) and autonomous cyberphysical systems. Unlike existing review papers that treat physical layer security orthogonally to cryptography, we will try to provide a few insights of underlying connections. Discussing many practical issues, we will present a comprehensive review of the state-of-the-art in i) secret key generation from shared randomness, ii) the wiretap channel and fundamental limits, iii) authentication of devices using physical unclonable functions (PUFs), localization and multi-factor authentication, and, iv) jamming attacks at the physical layer. We finally conclude with the proposers' aspirations for the 6G security landscape, in the hyper-connectivity and semantic communications era.
△ Less
Submitted 1 December, 2022;
originally announced December 2022.
-
Physical Layer Security -- from Theory to Practice
Authors:
Miroslav Mitev,
Thuy M. Pham,
Arsenia Chorti,
Andre Noll Barreto,
Gerhard Fettweis
Abstract:
A large spectrum of technologies are collectively dubbed as physical layer security (PLS), ranging from wiretap coding, secret key generation (SKG), authentication using physical unclonable functions (PUFs), localization / RF fingerprinting, anomaly detection monitoring the physical layer (PHY) and hardware. Despite the fact that the fundamental limits of PLS have long been characterized, incorpor…
▽ More
A large spectrum of technologies are collectively dubbed as physical layer security (PLS), ranging from wiretap coding, secret key generation (SKG), authentication using physical unclonable functions (PUFs), localization / RF fingerprinting, anomaly detection monitoring the physical layer (PHY) and hardware. Despite the fact that the fundamental limits of PLS have long been characterized, incorporating PLS in future wireless security standards requires further steps in terms of channel engineering and pre-processing. Reflecting upon the growing discussion in our community, in this critical review paper, we ask some important questions with respect to the key hurdles in the practical deployment of PLS in 6G, but also present some research directions and possible solutions, in particular our vision for context-aware 6G security that incorporates PLS.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Smart Channel State Information Pre-processing for Joint Authentication and Secret Key Distillation
Authors:
Muralikrishnan Srinivasan,
Sotiris Skaperas,
Arsenia Chorti,
Mahdi Shakiba Herfeh,
Muhammad K. Shehzad,
Philippe Sehier
Abstract:
While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, deterministic / stochastic process, we propose a power domain decomposition that allows performing the two tasks simultaneously. We devise intelligent pre-processi…
▽ More
While the literature on RF fingerprinting-based authentication and key distillation is vast, the two topics have customarily been studied separately. In this paper, starting from the observation that the wireless channel is a composite, deterministic / stochastic process, we propose a power domain decomposition that allows performing the two tasks simultaneously. We devise intelligent pre-processing schemes to decompose channel state information (CSI) observation vectors into "predictable" and "unpredictable" components. The former, primarily due to large-scale fading, can be used for node authentication through RF fingerprinting. The latter, primarily due to small-scale fading, could be used for semantically secure secret key generation (SKG). To perform the decomposition, we propose: (i) a fingerprint "separability" criterion, expressed through the maximisation of the total variation distance between the empirical fingerprint measures; (ii) a statistical independence metric for observations collected at different users, expressed through a normalised version of the $d$-dimensional Hilbert Schmidt independence criterion (dHSIC) test statistic. We propose both explicit implementations, using principal component analysis (PCA) and kernel PCA and black-box, unsupervised learning, using autoencoders. Our experiments on synthetic and real CSI datasets showcase that the incorporation of RF fingerprinting and SKG, with explicit security guarantees, is tangible in future generations of wireless.
△ Less
Submitted 1 June, 2022;
originally announced June 2022.
-
Physical Layer Security for 6G Systems why it is needed and how to make it happen
Authors:
Arsenia Chorti
Abstract:
Sixth generations (6G) systems will be required to meet diverse constraints in an integrated ground-air-space global network. In particular, meeting overly aggressive latency constraints, operating in massive connectivity regimes, with low energy footprint and low computational effort, while providing explicit security guarantees, can be challenging. In this setting, quality of security (QoSec) is…
▽ More
Sixth generations (6G) systems will be required to meet diverse constraints in an integrated ground-air-space global network. In particular, meeting overly aggressive latency constraints, operating in massive connectivity regimes, with low energy footprint and low computational effort, while providing explicit security guarantees, can be challenging. In this setting, quality of security (QoSec) is envisioned as a flexible security framework for future networks with highly diverse non-functional requirements. Mirroring the differentiated services (DiffServ) networking paradigm, different security levels could be conceptualized, moving away from static security controls, captured currently in zero-trust security architectures. In parallel, the integration of communications and sensing, along with embedded (on-device) AI, can provide the foundations for building autonomous and adaptive security controls, orchestrated by a vertical security plane in coordination with a vertical semantic plane. It is in this framework, that we envision the incorporation of physical layer security (PLS) schemes in 6G security protocols, introducing security controls at all layers, for the first time.
△ Less
Submitted 3 May, 2022;
originally announced May 2022.
-
Towards Intelligent Context-Aware 6G Security
Authors:
André N. Barreto,
Stefan Köpsell,
Arsenia Chorti,
Bertram Poettering,
Jens Jelitto,
Julia Hesse,
Jonathan Boole,
Konrad Rieck,
Marios Kountouris,
Dave Singelee,
Kumar Ashwinee
Abstract:
Imagine interconnected objects with embedded artificial intelligence (AI), empowered to sense the environment, see it, hear it, touch it, interact with it, and move. As future networks of intelligent objects come to life, tremendous new challenges arise for security, but also new opportunities, allowing to address current, as well as future, pressing needs. In this paper we put forward a roadmap t…
▽ More
Imagine interconnected objects with embedded artificial intelligence (AI), empowered to sense the environment, see it, hear it, touch it, interact with it, and move. As future networks of intelligent objects come to life, tremendous new challenges arise for security, but also new opportunities, allowing to address current, as well as future, pressing needs. In this paper we put forward a roadmap towards the realization of a new security paradigm that we articulate as intelligent context-aware security. The premise of this roadmap is that sensing and advanced AI will enable context awareness, which in turn can drive intelligent security mechanisms, such as adaptation and automation of security controls. This concept not only provides immediate answers to burning open questions, in particular with respect to non-functional requirements, such as energy or latency constraints, heterogeneity of radio frequency (RF) technologies and long life span of deployed devices, but also, more importantly, offers a viable answer to scalability by allowing such constraints to be met even in massive connectivity regimes. Furthermore, the proposed roadmap has to be designed ethically, by explicitly placing privacy concerns at its core. The path towards this vision and some of the challenges along the way are discussed in this contribution.
△ Less
Submitted 17 December, 2021;
originally announced December 2021.
-
On the Use of CSI for the Generation of RF Fingerprints and Secret Keys
Authors:
Muralikrishnan Srinivasan,
Sotiris Skaperas,
Arsenia Chorti
Abstract:
This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret ke…
▽ More
This paper presents a systematic approach to use channel state information for authentication and secret key distillation for physical layer security (PLS). We use popular machine learning (ML) methods and signal processing-based approaches to disentangle the large scale fading and be used as a source of uniqueness, from the small scale fading, to be treated as a source of shared entropy secret key generation (SKG). The ML-based approaches are completely unsupervised and hence avoid exhaustive measurement campaigns. We also propose using the Hilbert Schmidt independence criterion (HSIC); our simulation results demonstrate that the extracted stochastic part of the channel state information (CSI) vectors are statistically independent.
△ Less
Submitted 28 October, 2021;
originally announced October 2021.
-
Finite Blocklength Secrecy Analysis of Polar and Reed-Muller Codes in BEC Semi-Deterministic Wiretap Channels
Authors:
Mahdi Shakiba-Herfeh,
Laura Luzzi,
Arsenia Chorti
Abstract:
In this paper, we consider a semi-deterministic wiretap channel where the main channel is noiseless and the eavesdropper's channel is a binary erasure channel (BEC). We provide a lower bound for the achievable secrecy rates of polar and Reed Muller codes and compare it to the second order coding rate for the semi-deterministic wiretap channel. To the best of our knowledge, this is the first work w…
▽ More
In this paper, we consider a semi-deterministic wiretap channel where the main channel is noiseless and the eavesdropper's channel is a binary erasure channel (BEC). We provide a lower bound for the achievable secrecy rates of polar and Reed Muller codes and compare it to the second order coding rate for the semi-deterministic wiretap channel. To the best of our knowledge, this is the first work which demonstrates the secrecy performance of polar and Reed-Muller codes in short blocklengths. The results show that under a total variation secrecy metric, Reed Muller codes can achieve secrecy rates very close to the second order approximation rate. On the other hand, we observe a significant gap between the lower bound for the achievable rates of polar codes and the the second order approximation rate for short blocklengths.
△ Less
Submitted 22 May, 2021;
originally announced May 2021.
-
Rate Analysis and Deep Neural Network Detectors for SEFDM FTN Systems
Authors:
Arsenia Chorti,
David Picard
Abstract:
In this work we compare the capacity and achievable rate of uncoded faster than Nyquist (FTN) signalling in the frequency domain, also referred to as spectrally efficient FDM (SEFDM). We propose a deep residual convolutional neural network detector for SEFDM signals in additive white Gaussian noise channels, that allows to approach the Mazo limit in systems with up to 60 subcarriers. Notably, the…
▽ More
In this work we compare the capacity and achievable rate of uncoded faster than Nyquist (FTN) signalling in the frequency domain, also referred to as spectrally efficient FDM (SEFDM). We propose a deep residual convolutional neural network detector for SEFDM signals in additive white Gaussian noise channels, that allows to approach the Mazo limit in systems with up to 60 subcarriers. Notably, the deep detectors achieve a loss less than 0.4-0.7 dB for uncoded QPSK SEFDM systems of 12 to 60 subcarriers at a 15% spectral compression.
△ Less
Submitted 3 March, 2021;
originally announced March 2021.
-
Centralized and Distributed Intrusion Detection for Resource Constrained Wireless SDN Networks
Authors:
Gustavo A. Nunez Segura,
Arsenia Chorti,
Cintia Borges Margi
Abstract:
Software-defined networking (SDN) was devised to simplify network management and automate infrastructure sharing in wired networks. These benefits motivated the application of SDN in wireless sensor networks to leverage solutions for complex applications. However, some of the core SDN traits turn the networks prone to denial of service attacks (DoS). There are proposals in the literature to detect…
▽ More
Software-defined networking (SDN) was devised to simplify network management and automate infrastructure sharing in wired networks. These benefits motivated the application of SDN in wireless sensor networks to leverage solutions for complex applications. However, some of the core SDN traits turn the networks prone to denial of service attacks (DoS). There are proposals in the literature to detect DoS in wireless SDN networks, however, not without shortcomings: there is little focus on resource constraints, high detection rates have been reported only for small networks, and the detection is disengaged from the identification of the type of the attack or the attacker. Our work targets these shortcomings by introducing a lightweight, online change point detector to monitor performance metrics that are impacted when the network is under attack. A key novelty is that the proposed detector is able to operate in either centralized or distributed mode. The centralized detector has very high detection rates and can further distinguish the type of the attack (from a list of known attacks). On the other hand, the distributed detector provides information that allows to identify the nodes launching the attack. Our proposal is tested over IEEE 802.15.4 networks. The results show detection rates exceeding $96\%$ in networks of 36 and 100 nodes and identification of the type of the attack with a probability exceeding $0.89$ when using the centralized approach. Additionally, for some types of attack it was possible to pinpoint the attackers with an identification probability over $0.93$ when using distributed detectors.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Context-Aware Security for 6G Wireless The Role of Physical Layer Security
Authors:
Arsenia Chorti,
Andre Noll Barreto,
Stefan Kopsell,
Marco Zoli,
Marwa Chafii,
Philippe Sehier,
Gerhard Fettweis,
H. Vincent Poor
Abstract:
Sixth generation systems are expected to face new security challenges, while opening up new frontiers towards context awareness in the wireless edge. The workhorse behind this projected technological leap will be a whole new set of sensing capabilities predicted for 6G devices, in addition to the ability to achieve high precision localization. The combination of these enhanced traits can give rise…
▽ More
Sixth generation systems are expected to face new security challenges, while opening up new frontiers towards context awareness in the wireless edge. The workhorse behind this projected technological leap will be a whole new set of sensing capabilities predicted for 6G devices, in addition to the ability to achieve high precision localization. The combination of these enhanced traits can give rise to a new breed of context-aware security protocols, following the quality of security (QoSec) paradigm. In this framework, physical layer security solutions emerge as competitive candidates for low complexity, low-delay and low-footprint, adaptive, flexible and context aware security schemes, leveraging the physical layer of the communications in genuinely cross-layer protocols, for the first time.
△ Less
Submitted 18 May, 2022; v1 submitted 5 January, 2021;
originally announced January 2021.
-
Brief Report on QoSec, Context Aware Security and the Role of Physical Layer Security in 6G Wireless
Authors:
Arsenia Chorti
Abstract:
While the security literature predominantly focuses on the core network, the enhancement of the security of the beyond fifth generation (B5G) access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not yet been fully addressed. In parallel as we move gradually away from the standard client-server n…
▽ More
While the security literature predominantly focuses on the core network, the enhancement of the security of the beyond fifth generation (B5G) access network becomes of critical importance. Despite the strengthening of 5G security protocols with respect to LTE, there are still open issues that have not yet been fully addressed. In parallel as we move gradually away from the standard client-server networking paradigm and enter a new era of truly E2E quality of service (QoS), service level agreements (SLAs) in the near future will be expected to include guarantees about the quality of security (QoSec) as well. Incorporating context awareness in QoSec is projected to allow handle more efficiently aspects related to identifying the risk or threat level and the required security level. Finally, as novel sensing and intelligence capabilities are envisioned in 6G, security solutions from the palette of physical layer security can emerge, particularly for massive machine type communications involving large scale low-end IoT devices.
△ Less
Submitted 14 November, 2020;
originally announced November 2020.
-
5G New Radio Resource Allocation Optimization for Heterogeneous Services
Authors:
Nasim Ferdosian,
Sara Berri,
Arsenia Chorti
Abstract:
5G new radio (NR) introduced flexible numerology to provide the necessary flexibility for multiplexing the communication of heterogeneous services on a shared channel. One of the fundamental challenges of 5G NR is to develop resource allocation schemes to efficiently exploit such flexibility to optimize resource allocation of ultra-reliable low-latency communications (URLLC) in coexistence with en…
▽ More
5G new radio (NR) introduced flexible numerology to provide the necessary flexibility for multiplexing the communication of heterogeneous services on a shared channel. One of the fundamental challenges of 5G NR is to develop resource allocation schemes to efficiently exploit such flexibility to optimize resource allocation of ultra-reliable low-latency communications (URLLC) in coexistence with enhanced mobile broadband (eMBB) while ensuring their colliding performance requirements. To address this challenge, we present a new formulation of 5G NR resource allocation to accommodate eMBB and URLLC services, by considering their interplay. The objective of the formulated problem is to meet throughput quality of service (QoS) requirements probabilistically when the optimal global solution is infeasible. To this end, we express the problem as an integer linear program and consider two formulations with hard and soft URLLC throughput constraints. Furthermore, we propose a low-complexity two-step heuristic approach, inspired by an instance of bin packing optimization, to provide a trade-off between resource allocation efficiency and computational complexity. Finally, performance results are provided and demonstrate that the proposed approaches can provide low-complexity resource allocation solutions, in balance with the performance targets of the services.
△ Less
Submitted 1 November, 2020;
originally announced November 2020.
-
Multi-factor Physical Layer Security Authentication in Short Blocklength Communication
Authors:
Miroslav Mitev,
Mahdi Shekiba-Herfeh,
Arsenia Chorti,
Martin Reed
Abstract:
Lightweight and low latency security schemes at the physical layer that have recently attracted a lot of attention include: (i) physical unclonable functions (PUFs), (ii) localization based authentication, and, (iii) secret key generation (SKG) from wireless fading coefficients. In this paper, we focus on short blocklengths and propose a fast, privacy preserving, multi-factor authentication protoc…
▽ More
Lightweight and low latency security schemes at the physical layer that have recently attracted a lot of attention include: (i) physical unclonable functions (PUFs), (ii) localization based authentication, and, (iii) secret key generation (SKG) from wireless fading coefficients. In this paper, we focus on short blocklengths and propose a fast, privacy preserving, multi-factor authentication protocol that uniquely combines PUFs, proximity estimation and SKG. We focus on delay constrained applications and demonstrate the performance of the SKG scheme in the short blocklength by providing a numerical comparison of three families of channel codes, including half rate low density parity check codes (LDPC), Bose Chaudhuri Hocquenghem (BCH), and, Polar Slepian Wolf codes for n=512, 1024. The SKG keys are incorporated in a zero-round-trip-time resumption protocol for fast re-authentication. All schemes of the proposed mutual authentication protocol are shown to be secure through formal proofs using Burrows, Abadi and Needham (BAN) and Mao and Boyd (MB) logic as well as the Tamarin-prover.
△ Less
Submitted 24 February, 2021; v1 submitted 27 October, 2020;
originally announced October 2020.
-
Asymptotic Performance Analysis of NOMA Uplink Networks Under Statistical QoS Delay Constraints
Authors:
Mouktar Bello,
Arsenia Chorti,
Inbar Fijalkow,
Wenjuan Yu,
Leila Musavian
Abstract:
In this paper, we study the performance of an uplink non-orthogonal multiple access (NOMA) network under statistical quality of service (QoS) delay constraints, captured through each user s effective capacity (EC). We first propose novel closed-form expressions for the EC in a two-user NOMA network and show that in the high signal-to-noise ratio (SNR) region, the 'strong' NOMA user, referred to as…
▽ More
In this paper, we study the performance of an uplink non-orthogonal multiple access (NOMA) network under statistical quality of service (QoS) delay constraints, captured through each user s effective capacity (EC). We first propose novel closed-form expressions for the EC in a two-user NOMA network and show that in the high signal-to-noise ratio (SNR) region, the 'strong' NOMA user, referred to as U2, has a limited EC, assuming the same delay constraint as the 'weak' user, referred to as U1. We demonstrate that for the weak userU1, OMA and NOMA have comparable performance at low transmit SNRs, while NOMA outperforms OMA in terms of EC at high SNRs. On the other hand, for the strong user U2, NOMA achieves higher EC than OMA at small SNRs, while OMA becomes more beneficial at high SNRs. Furthermore, we show that at high transmit SNRs, irrespective of whether the application is delay tolerant, or not, the performance gains of NOMA over OMA for U1, and OMA over NOMA for U2 remain unchanged. When the delay QoS of one user is fixed, the performance gap between NOMA and OMA in terms of total EC increases with decreasing statistical delay QoS constraints for the other user. Next, by introducing pairing, we show that NOMA with user-pairing outperforms OMA, in terms of total uplink EC. The best pairing strategies are given in the cases of four and six users NOMA, raising once again the importance of power allocation in the optimization of NOMA s performance.
△ Less
Submitted 27 July, 2020;
originally announced July 2020.
-
Performance Analysis of Uplink NOMA-Relevant Strategy Under Statistical Delay QoS Constraints
Authors:
Mylene Pischella,
Arsenia Chorti,
Inbar Fijalkow
Abstract:
A new multiple access (MA) strategy, referred to as non orthogonal multiple access - Relevant (NOMA-R), allows selecting NOMA when this increases all individual rates, i.e., it is beneficial for both strong(er) and weak(er) individual users. This letter provides a performance analysis of the NOMA-R strategy in uplink networks with statistical delay constraints. Closed-form expressions of the effec…
▽ More
A new multiple access (MA) strategy, referred to as non orthogonal multiple access - Relevant (NOMA-R), allows selecting NOMA when this increases all individual rates, i.e., it is beneficial for both strong(er) and weak(er) individual users. This letter provides a performance analysis of the NOMA-R strategy in uplink networks with statistical delay constraints. Closed-form expressions of the effective capacity (EC) are provided in two-users networks, showing that the strong user always achieves a higher EC with NOMA-R. Regarding the network's sum EC, there are distinctive gains with NOMA-R, particularly under stringent delay constraints.
△ Less
Submitted 23 April, 2020;
originally announced April 2020.
-
Man-in-the-Middle and Denial of Service Attacks in Wireless Secret Key Generation
Authors:
Miroslav Mitev,
Arsenia Chorti,
E. Veronica Belmega,
Martin Reed
Abstract:
Wireless secret key generation (W-SKG) from shared randomness (e.g., from the wireless channel fading realizations), is a well established scheme that can be used for session key agreement. W-SKG approaches can be of particular interest in delay constrained wireless networks and notably in the context of ultra reliable low latency communications (URLLC) in beyond fifth generation (B5G) systems. Ho…
▽ More
Wireless secret key generation (W-SKG) from shared randomness (e.g., from the wireless channel fading realizations), is a well established scheme that can be used for session key agreement. W-SKG approaches can be of particular interest in delay constrained wireless networks and notably in the context of ultra reliable low latency communications (URLLC) in beyond fifth generation (B5G) systems. However, W-SKG schemes are known to be malleable over the so called "advantage distillation" phase, during which observations of the shared randomness are obtained at the legitimate parties. As an example, an active attacker can act as a man-in-the-middle (MiM) by injecting pilot signals and/or can mount denial of service attacks (DoS) in the form of jamming. This paper investigates the impact of injection and reactive jamming attacks in W-SKG. First, it is demonstrated that injection attacks can be reduced to - potentially less harmful - jamming attacks by pilot randomization; a novel system design with randomized QPSK pilots is presented. Subsequently, the optimal jamming strategy is identified in a block fading additive white Gaussian noise (BF-AWGN) channel in the presence of a reactive jammer, using a game theoretic formulation. It is shown that the impact of a reactive jammer is far more severe than that of a simple proactive jammer
△ Less
Submitted 26 March, 2020;
originally announced March 2020.
-
Denial of Service Attacks Detection in Software-Defined Wireless Sensor Networks
Authors:
Gustavo A. Nunez Segura,
Sotiris Skaperas,
Arsenia Chorti,
Lefteris Mamatas,
Cintia Borges Margi
Abstract:
Software-defined networking (SDN) is a promising technology to overcome many challenges in wireless sensor networks (WSN), particularly with respect to flexibility and reuse. Conversely, the centralization and the planes' separation turn SDNs vulnerable to new security threats in the general context of distributed denial of service (DDoS) attacks. State-of-the-art approaches to identify DDoS do no…
▽ More
Software-defined networking (SDN) is a promising technology to overcome many challenges in wireless sensor networks (WSN), particularly with respect to flexibility and reuse. Conversely, the centralization and the planes' separation turn SDNs vulnerable to new security threats in the general context of distributed denial of service (DDoS) attacks. State-of-the-art approaches to identify DDoS do not always take into consideration restrictions in typical WSNs e.g., computational complexity and power constraints, while further performance improvement is always a target. The objective of this work is to propose a lightweight but very efficient DDoS attack detection approach using change point analysis. Our approach has a high detection rate and linear complexity, so that it is suitable for WSNs. We demonstrate the performance of our detector in software-defined WSNs of 36 and 100 nodes with varying attack intensity (the number of attackers ranges from 5% to 20% of nodes). We use change point detectors to monitor anomalies in two metrics: the data packets delivery rate and the control packets overhead. Our results show that with increasing intensity of attack, our approach can achieve a detection rate close to100% and that the type of attack can also be inferred.
△ Less
Submitted 26 March, 2020;
originally announced March 2020.
-
Performance Analysis of NOMA Uplink Networks under Statistical QoS Delay Constraints
Authors:
Mouktar Bello,
Wenjuan Yu,
Arsenia Chorti,
Leila Musavian
Abstract:
In the fifth generation and beyond (B5G), delayconstraints emerge as a topic of particular interest, e.g. forultra-reliable low latency communications (URLLC) such asautonomous vehicles and enhanced reality. In this paper, westudythe performance of a two-user uplink NOMA network understatistical quality of service (QoS) delay constraints, capturedthrough each user s effective capacity (EC). We pro…
▽ More
In the fifth generation and beyond (B5G), delayconstraints emerge as a topic of particular interest, e.g. forultra-reliable low latency communications (URLLC) such asautonomous vehicles and enhanced reality. In this paper, westudythe performance of a two-user uplink NOMA network understatistical quality of service (QoS) delay constraints, capturedthrough each user s effective capacity (EC). We propose novelclosed-form expressions for the EC of the NOMA users andshow that in the high signal to noise ratio (SNR) region, the 'strong' NOMA user has a limited EC, assuming the same delayconstraint as the 'weak' user. We demonstrate that for the weakuser, OMA achieves higher EC than NOMA at small values ofthe transmit SNR, while NOMA outperforms OMA in terms ofEC at high SNRs. On the other hand, for the strong user theopposite is true, i.e., NOMA achieves higher EC than OMA atsmall SNRs, while OMA becomes more beneficial at high SNRs.This result raises the question of introducing 'adaptive' OMA /NOMA policies, based jointly on the users delay constraints aswell as on the available transmit power.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Flexible Multiple Access Enabling Low-Latency Communications: Introducing NOMA-R
Authors:
Mouktar Bello,
Wenjuan Yu,
Mylene Pischella,
Arsenia Chorti,
Inbar Fijalkow,
Leila Musavian
Abstract:
Various verticals in 5G and beyond (B5G) networks require very stringent latency guarantees, while at the same time envisioning massive connectivity. As a result, choosing the optimal multiple access (MA) technique to achieve low latency is a key enabler of B5G. In particular, this issue is more acute in uplink transmissions due to the potentially high number of collisions. On this premise, in the…
▽ More
Various verticals in 5G and beyond (B5G) networks require very stringent latency guarantees, while at the same time envisioning massive connectivity. As a result, choosing the optimal multiple access (MA) technique to achieve low latency is a key enabler of B5G. In particular, this issue is more acute in uplink transmissions due to the potentially high number of collisions. On this premise, in the present contribution we discuss the issue of delay-sensitive uplink connectivity using optimized MA techniques; to this end, we perform a comparative analysis of various MA approaches with respect to the achievable effective capacity (EC). As opposed to standard rate (PHY) or throughput (MAC) analyses, we propose the concept of the effective capacity as a suitable metric for characterizing jointly PHY-MAC layer delays. The palette of investigated MA approaches includes standard orthogonal MA (OMA) and power domain non orthogonal MA (NOMA) in uplink scenarios, both considering random pairing and optimized pairing alternatives. It further extends to encompass a recently proposed third alternative, referred to as NOMA-Relevant (NOMA-R), which extends OMA and NOMA approaches by flexibly selecting the MA technique. We show that optimizing both user pairing and MA selection increases the network EC, especially when stringent delay constraints are in place; thus a flexible MA is a potentially preferable strategy for future low latency applications
△ Less
Submitted 28 January, 2020;
originally announced January 2020.
-
Authenticated Secret Key Generation in Delay Constrained Wireless Systems
Authors:
Miroslav Mitev,
Arsenia Chorti,
Martin Reed,
Leila Musavian
Abstract:
With the emergence of 5G low latency applications, such as haptics and V2X, low complexity and low latency security mechanisms are sought. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework we propose i) a novel authenticated encryption using SKG; ii) a combined PUF / SKG…
▽ More
With the emergence of 5G low latency applications, such as haptics and V2X, low complexity and low latency security mechanisms are sought. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework we propose i) a novel authenticated encryption using SKG; ii) a combined PUF / SKG authentication to reduce computational overhead; iii) a 0-RTT resumption authentication protocol; iv) pipelining of the SKG and the encrypted data transfer. With respect to the latter, we investigate a parallel SKG approach for multi-carrier systems, where a subset of the subcarriers are used for SKG and the rest for data transmission. The optimal resource allocation is identified under security, power and delay constraints, by formulating the subcarrier allocation as a subset-sum $0-1$ knapsack optimization problem. A heuristic approach of linear complexity is proposed and shown to incur negligible loss with respect to the optimal dynamic programming solution. All of the proposed mechanisms, have the potential to pave the way for a new breed of latency aware security protocols.
△ Less
Submitted 26 March, 2020; v1 submitted 20 January, 2020;
originally announced January 2020.
-
Physical Layer Security: Authentication, Integrity and Confidentiality
Authors:
Mahdi Shakiba-Herfeh,
Arsenia Chorti,
H. Vince Poor
Abstract:
The goal of physical layer security (PLS) is to make use of the properties of the physical layer, including the wireless communication medium and the transceiver hardware, to enable critical aspects of secure communications. In particular, PLS can be employed to provide i) node authentication, ii) message authentication, and, iii) message confidentiality. Unlike the corresponding classical cryptog…
▽ More
The goal of physical layer security (PLS) is to make use of the properties of the physical layer, including the wireless communication medium and the transceiver hardware, to enable critical aspects of secure communications. In particular, PLS can be employed to provide i) node authentication, ii) message authentication, and, iii) message confidentiality. Unlike the corresponding classical cryptographic approaches which are all based on computational security, PLS's added strength is that it is based on information theoretic security, in which no limitation with respect to the opponent's computational power is assumed and is therefore inherently quantum resistant. In this survey, we review the aforementioned fundamental aspects of PLS, starting with node authentication, moving to the information theoretic characterization of message integrity, and finally, discussing message confidentiality both in the secret key generation from shared randomness and from the wiretap channel point of view. The aim of this review is to provide a comprehensive roadmap on important relevant results by the authors and other contributors and discuss open issues on the applicability of PLS in sixth generation systems.
△ Less
Submitted 20 January, 2020;
originally announced January 2020.
-
Mitigating Jamming Attacks Using Energy Harvesting
Authors:
Gada Rezgui,
E. Veronica Belmega,
Arsenia Chorti
Abstract:
The use of energy harvesting as a counter-jamming measure is investigated on the premise that part of the harmful interference can be harvested to increase the transmit power. We formulate the strategic interaction between a pair of legitimate nodes and a malicious jammer as a zero-sum game. Our analysis demonstrates that the legitimate nodes are able to neutralize the jammer. However, this policy…
▽ More
The use of energy harvesting as a counter-jamming measure is investigated on the premise that part of the harmful interference can be harvested to increase the transmit power. We formulate the strategic interaction between a pair of legitimate nodes and a malicious jammer as a zero-sum game. Our analysis demonstrates that the legitimate nodes are able to neutralize the jammer. However, this policy is not necessarily a Nash equilibrium and hence is sub-optimal. Instead, harvesting the jamming interference can lead to relative gains of up to 95%, on average, in terms of Shannon capacity, when the jamming interference is high.
△ Less
Submitted 11 January, 2019;
originally announced January 2019.
-
Perfect Secrecy in Physical Layer Network Coding Systems from Structured Interference
Authors:
David Karpuk,
Arsenia Chorti
Abstract:
Physical layer network coding (PNC) has been proposed for next generation networks. In this contribution, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite and uniform signal input distributions we propose upper bounds (UBs) on the achievable perf…
▽ More
Physical layer network coding (PNC) has been proposed for next generation networks. In this contribution, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite and uniform signal input distributions we propose upper bounds (UBs) on the achievable perfect secrecy rates and make these explicit when PAM modems are used. We then describe two simple, explicit encoders that can achieve perfect secrecy rates close to these UBs with respect to an untrustworthy relay in the single antenna and single relay setting. Lastly, we generalize our system to a MIMO relay channel where the relay has more antennas than the users and optimal precoding matrices which maintain a required secrecy constraint are studied. Our results establish that the design of PNC transmission schemes with enhanced throughput and guaranteed data confidentiality is feasible in next generation systems.
△ Less
Submitted 1 February, 2016; v1 submitted 4 July, 2015;
originally announced July 2015.
-
Degrees of Freedom and Secrecy in Wireless Relay Networks
Authors:
Arsenia Chorti,
Ragnar Freij,
David Karpuk
Abstract:
We translate the problem of designing a secure communications protocol for several users communicating through a relay in a wireless network into understanding certain subvarieties of products of Grassmannians. We calculate the dimension of these subvarieties and provide various results concerning their defning equations. When the relay and all of the users have the same number of antennas, this a…
▽ More
We translate the problem of designing a secure communications protocol for several users communicating through a relay in a wireless network into understanding certain subvarieties of products of Grassmannians. We calculate the dimension of these subvarieties and provide various results concerning their defning equations. When the relay and all of the users have the same number of antennas, this approach places fundamental limits on the amount of data that can be passed through such a network.
△ Less
Submitted 12 December, 2014;
originally announced February 2015.
-
Strong Secrecy in Wireless Network Coding Systems with M-QAM Modulators
Authors:
Arsenia Chorti,
Mehdi M. Molu,
David Karpuk,
Camilla Hollanti,
Alister Burr
Abstract:
We investigate the possibility of developing physical layer network coding (PNC) schemes with embedded strong secrecy based on standard QAM modulators. The proposed scheme employs a triple binning approach at the QAM front-end of the wireless PNC encoders. A constructive example of a strong secrecy encoder is presented when a BPSK and an 8-PAM modulator are employed at the wireless transmitters an…
▽ More
We investigate the possibility of developing physical layer network coding (PNC) schemes with embedded strong secrecy based on standard QAM modulators. The proposed scheme employs a triple binning approach at the QAM front-end of the wireless PNC encoders. A constructive example of a strong secrecy encoder is presented when a BPSK and an 8-PAM modulator are employed at the wireless transmitters and generalized to arbitrary M-QAM modulators, assuming channel inversion is attainable at the first cycle of the transmission. Our preliminary investigations demonstrate the potential of using such techniques to increase the throughput while in parallel not compromise the confidentiality of the exchanged data.
△ Less
Submitted 3 July, 2014;
originally announced July 2014.
-
Optimal Power Allocation in Block Fading Gaussian Channels with Causal CSI and Secrecy Constraints
Authors:
Arsenia Chorti,
Katerina Papadaki,
H. Vincent Poor
Abstract:
The optimal power allocation that maximizes the secrecy capacity of block fading Gaussian (BF-Gaussian) networks with causal channel state information (CSI), M-block delay tolerance and a frame based power constraint is examined. In particular, we formulate the secrecy capacity maximization as a dynamic program. We propose suitable linear approximations of the secrecy capacity density in the low S…
▽ More
The optimal power allocation that maximizes the secrecy capacity of block fading Gaussian (BF-Gaussian) networks with causal channel state information (CSI), M-block delay tolerance and a frame based power constraint is examined. In particular, we formulate the secrecy capacity maximization as a dynamic program. We propose suitable linear approximations of the secrecy capacity density in the low SNR, the high SNR and the intermediate SNR regimes, according to the overall available power budget. Our findings indicate that when the available power resources are very low (low SNR case) the optimal strategy is a threshold policy. On the other hand when the available power budget is infinite (high SNR case) a constant power policy maximizes the frame secrecy capacity. Finally, when the power budget is finite (medium SNR case), an approximate tractable power allocation policy is derived.
△ Less
Submitted 27 January, 2014;
originally announced January 2014.