WO2023107067A1 - Channel-decomposition based adaptive physical layer security - Google Patents
Channel-decomposition based adaptive physical layer security Download PDFInfo
- Publication number
- WO2023107067A1 WO2023107067A1 PCT/TR2022/051423 TR2022051423W WO2023107067A1 WO 2023107067 A1 WO2023107067 A1 WO 2023107067A1 TR 2022051423 W TR2022051423 W TR 2022051423W WO 2023107067 A1 WO2023107067 A1 WO 2023107067A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- channel
- data
- legitimate
- pass
- decomposing
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; arrangements for supplying electrical power along data transmission lines
- H04L25/0202—Channel estimation
- H04L25/0224—Channel estimation using sounding signals
Definitions
- PLS physical layer security
- key generation-based approaches include key generation-based approaches, adaptive communication-based approaches, artificial noise-based techniques, and waveform features concealing techniques.
- Key generation-based techniques are based on the exploitation of channel reciprocity property between legitimate nodes as a common source of randomness. For example, amplitude and phase related to received signal strength (RSS), channel impulse response (CIR), channel frequency response (CFR), and other feedbacks can be used for key generation .
- RSS received signal strength
- CIR channel impulse response
- CFR channel frequency response
- Other feedbacks can be used for key generation .
- the parameters are adjusted/adapted based on the location, channel conditions, and quality-of-service (QoS) requirements of the legitimate receiver only.
- QoS quality-of-service
- pre- equalization-based techniques which provide security but result in high peak to average power ratio (PAPR)
- PAPR peak to average power ratio
- sub-carrier selection-based techniques provide security at the cost of loss in spectral efficiency.
- an interference signal is added by the trusted node to degrade the performance of a legitimate node without affecting the performance of the legitimate receiver.
- the interference signal may cause an increase in PAPR and little power degradation due to the sacrifice of the power resources for noise generation.
- pilot tone manipulation Several techniques have been proposed in the literature to ensure the security of reference signals including pilot tone manipulation, artificial noise embedding and anti-eavesdropping pilot design.
- the phases of pilots are rotated based on preceding instantaneous channel information of subcarriers at the transmitter. This deteriorates the eavesdropping capability during the channel estimation phase, where only the intended receiver can estimate the channel correctly.
- artificial noise is embedded in the pilot signal based on the uplink CSI to degrade the channel estimation performance at the attacker during downlink pilot transmission.
- the pilots from the legitimate nodes are designed in such a way that the composite pilot matrix has a full rank for legitimate nodes while having rank deficiency with respect to the attacker. This ensures that the attacker cannot observe the subspace of its CSI using the legitimate pilots.
- the present invention is related to a method for channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks in order to eliminate the disadvantages mentioned above and to bring new advantages to the related technical field.
- This invention provides a novel channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks.
- PLS physical layer security
- the proposed algorithms can provide secure and efficient communication without depending on the conventional cryptography-based security solutions. More specifically, the proposed algorithm that is based on physical layer (PHY) security concept can solve the following problems related to conventional security:
- Future networks need to support new wireless technologies like 5G-Tactile Internet, Internet of Things (loT), Ultra-Reliable Low Latency Communication (ULLRC), remote surgery.
- LoT Internet of Things
- UDLRC Ultra-Reliable Low Latency Communication
- the devices used in these applications are naturally power-limited, processing-restricted and delay-sensitive which make cryptography-based techniques unfeasible for such type of technologies.
- the attacker can learn about the environment if the pilots are not secured. Moreover, sending pilots can also enable the attacker to learn about the precoder designed at the legitimate transmitter which leads to leakage of channel state information of legitimate nodes to the attacker as mentioned in prior art,
- Any wireless communication technology can utilize this invention to provide protection to data, pilots or jointly data and pilots against eavesdroppers.
- standards like 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network are particularly relevant to the invention due to the support of multipoint coordination provided in both standards.
- CMDA code division multiple access
- FDMA frequency division multiple access
- GSM Global System for Mobile communications
- GPRS GSM/General Packet Radio Service
- EDGE Enhanced Data GSM Environment
- W-CDMA Wideband-CDMA
- EV-DO Evolution Data Optimized
- HSPA High Speed Packet Access
- HSDPA High Speed Downlink Packet Access
- HSUPA High Speed Uplink Packet Access
- Evolved High Speed Packet Access HSPA+
- LTE Long Term Evolution
- AMPS 5G New Radio (NR)
- NR 5G New Radio
- the proposed algorithm can provide security without conventional cryptography-based methods thus avoiding key sharing, distribution, and management issues for future networks.
- the proposed algorithm can be implemented to provide flexible and scenario-specific security by securing data only, pilots only or jointly data and pilots.
- the proposed algorithm can provide security without degrading the BER performance of a legitimate node, causing an increase in the PAPR at the transmitter, causing a loss in spectral efficiency, and sacrificing power for noise.
- the design is based on decomposing the channel into all-pass and minimum phase channels and exploiting the property of decomposed channels to provide security.
- the proposed algorithm can provide security for pilot such that the attacker cannot learn the correct pilots, thus he cannot learn the environment.
- the eavesdropper will not be able extract information of precoder corresponding to legitimate nodes from received signal due to the pilot security.
- the proposed algorithm can be implemented for hiding hardware impairments in RF-based PHY authentication.
- the enclosed method provides security even in the case of co-located eavesdropper.
- the enclosed method is applicable to single user, multiuser, single antenna, multi antenna, centralized, and distributed systems.
- Figure 1 System model.
- H H AP H M IN : Alice will decompose the channel H into all pass H AP and minimum phase H M , N components.
- H ae The channel observed at Eve from Alice
- Hbe The channel observed at Eve from Bob
- an OFDM system is considered that consists of a legitimate transmitter (Alice, ⁇ a ⁇ ), legitimate receiver (Bob, ⁇ b ⁇ ) and passive eavesdropper (Eve, ⁇ e ⁇ ) that is trying to intercept the transmission between Alice and Bob.
- the channels observed at Alice from Bob H ⁇ ba ⁇ , Bob from Alice H ⁇ ab ⁇ , Eve from Bob H ⁇ be ⁇ , and Eve from Alice H ⁇ ae ⁇ are considered as multi-path slowly varying channels with exponentially decaying taps having Rayleigh fading distribution.
- Our proposed algorithm is based on novel utilization of minimum phase (MP) and all pass (AP) channel decomposition for providing pilot and data security.
- MP minimum phase
- AP all pass
- the wireless channel has a Finite Impulse Response (FIR); therefore, it is stable. Additionally, wireless channel is a real-life system, it must be causal. These two conditions ensure that the channel can be decomposed to MP and AP channels as follows: where H(z) is the transfer function of the channel, H MIN (z) and H AP (z) are the minimum phase and the allpass components of H(z), q denotes the number of zeros outside the unit circle and p is a complex number defined such that l/p k is the location of the system’s zeros. The zeros inside the unit circle are given inside the term ⁇ (z).
- FIR Finite Impulse Response
- CSI channel state information
- the PHY security algorithm is based on the channel state information (CSI) availability at Alice, which is used for providing security for data or pilot or jointly data and pilot.
- CSI channel state information
- Step4 The estimated channel can be decomposed into all pass ,H APb ) 2 and minimum phase H MPb . Finally, the estimated channel at Bob can be given as
- Step2 Afterwards, it multiplies the data (D) with the reciprocal of all pass components of the channel as 1/H AP and transmits towards Bob.
- Step4 Finally, Bob equalizes the H M , N to decode the data.
- Invention can also provide data and pilot security jointly.
- a frame which consists of pilots (P) and data (£>).
- Step4 The estimated channel can be decomposed into all pass (H AP ) 2 and minimum phase H MPb . Finally, the estimated channel at Bob can be given as
- Step6 Afterwards, it multiplies the data (D) with the reciprocal of all pass components of the channel as 1/H AP and transmits towards Bob.
- Step7 The received signal at Bob can be given as R.
- Step8 Finally, Bob equalizes the H M , N to decode the data.
- the operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks comprising the steps of; First, decompose the channel into minimum phase and all-pass components. Afterwards, use the components of the channel intelligently to design algorithms for data and pilot security.
- An operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks comprising the steps of;
- the Industrial Application of the Invention Present invention provides a method for protecting data and/or pilots in rich scattering channels against Eavesdropping attacks.
- the method of the invention can be implemented on any wireless technology to provide protection to data, pilots or jointly data and pilots against eavesdroppers.
- CMDA code division multiple access
- FDMA frequency division multiple access
- GSM Global System for Mobile communications
- GPRS GSM/General Packet Radio Service
- EDGE Enhanced Data GSM Environment
- W-CDMA Wideband-CDMA
- EV-DO Evolution Data Optimized
- HSPA High Speed Packet Access
- HSDPA High Speed Downlink Packet Access
- HSUPA High Speed Uplink Packet Access
- Evolved High Speed Packet Access HSPA+
- LTE Long Term Evolution
- AMPS 5G New Radio (NR)
- NR 5G New Radio
- the method of the invention has the potential to provide scenario specific security for future networks that are expected to support diverse services and scenarios with different security requirements.
Abstract
In this invention, channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks is proposed.
Description
CHANNEL-DECOMPOSITION BASED ADAPTIVE PHYSICAL LAYER SECURITY FOR FUTURE WIRELESS NETWORKS
Technical Field
In this invention, channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks is proposed.
Prior Art
Among the top areas in physical layer security (PLS), securing communication in rich scattering channels has drawn enormous attention recently. Different security techniques have been proposed in the literature. These techniques include key generation-based approaches, adaptive communication-based approaches, artificial noise-based techniques, and waveform features concealing techniques. Key generation-based techniques are based on the exploitation of channel reciprocity property between legitimate nodes as a common source of randomness. For example, amplitude and phase related to received signal strength (RSS), channel impulse response (CIR), channel frequency response (CFR), and other feedbacks can be used for key generation . These techniques are interesting in the sense that they can solve the problems faced by conventional cryptography-based algorithms related to key management and distribution in future heterogeneous wireless networks. However, they are very sensitive to reciprocity mismatch and channel estimation error especially at low signal-to-noise ratio (SNR). In adaptive transmission-based techniques, the parameters are adjusted/adapted based on the location, channel conditions, and quality-of-service (QoS) requirements of the legitimate receiver only. For example, pre- equalization-based techniques which provide security but result in high peak to average power ratio (PAPR), sub-carrier selection-based techniques provide security at the cost of loss in spectral efficiency. In an artificial noise-based technique, an interference signal is added by the trusted node to degrade the performance of a legitimate node without affecting the performance of the legitimate receiver. However, the interference signal may cause an increase in PAPR and little power degradation due to the sacrifice of the power resources for noise generation.
Several techniques have been proposed in the literature to ensure the security of reference signals including pilot tone manipulation, artificial noise embedding and anti-eavesdropping pilot design. In prior art, the phases of pilots are rotated based on preceding instantaneous channel information of subcarriers at the transmitter. This deteriorates the eavesdropping capability during the channel estimation phase, where only the intended receiver can estimate the channel correctly. In prior art, artificial noise is embedded in the pilot signal based on the uplink CSI to degrade the channel estimation performance at the attacker during downlink pilot transmission. Particularly, the pilots from the legitimate nodes are designed in such a way that the composite pilot matrix has a full rank for legitimate nodes while having rank deficiency with respect to the attacker. This ensures that the attacker cannot observe the subspace of its CSI using the legitimate pilots.
Aims of the Invention and Brief Description
The present invention is related to a method for channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks in order to eliminate the disadvantages mentioned above and to bring new advantages to the related technical field.
This invention provides a novel channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks.
The broadcast nature of wireless communication renders it prone to various security threats. One of these threats is the violation of confidentiality of communication, also referred to as eavesdropping. In this case, a malicious node/device tries to intercept and interpret the communication going on between two legitimate nodes. Conventionally, security techniques in the upper layers, such as cryptography-based techniques, have been employed for secure transmission. However, such security techniques may not be adequate for future (5G and beyond) decentralized and heterogeneous networks due to the increased complexity of key management and sharing mechanisms. Keeping this in mind, physical layer security (PLS) mechanisms such as the one mentioned in this invention have become increasingly popular in recent years.
The proposed algorithms can provide secure and efficient communication without depending on the conventional cryptography-based security solutions. More specifically, the proposed algorithm
that is based on physical layer (PHY) security concept can solve the following problems related to conventional security:
1.
1. Future networks need to support new wireless technologies like 5G-Tactile Internet, Internet of Things (loT), Ultra-Reliable Low Latency Communication (ULLRC), remote surgery. However, the devices used in these applications are naturally power-limited, processing-restricted and delay-sensitive which make cryptography-based techniques unfeasible for such type of technologies.
2. Future networks are expected to support diverse services and scenarios that have different security requirements. The encryption-based method cannot provide scenario specific security.
3. The attacker can learn about the environment if the pilots are not secured. Moreover, sending pilots can also enable the attacker to learn about the precoder designed at the legitimate transmitter which leads to leakage of channel state information of legitimate nodes to the attacker as mentioned in prior art,
4. Most of the PHY security algorithms assume the channel to known at both nodes of transmission (or at least at one side). At the stage of estimating and feedbacking the channel the security is very vulnerable to eavesdropper, and if attacker learned the channel the PHY security algorithm can be cracked.
Any wireless communication technology can utilize this invention to provide protection to data, pilots or jointly data and pilots against eavesdroppers. However, standards like 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network are particularly relevant to the invention due to the support of multipoint coordination provided in both standards. Furthermore, the described method in this invention can be implemented on any device, system or network capable of supporting any of the aforementioned standards, for instance: code division multiple access (CMDA), frequency division multiple access (FDMA), Global System for Mobile communications (GSM), GSM/General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), Wideband-CDMA (W-CDMA), Evolution Data Optimized (EV-DO), High
Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), Evolved High Speed Packet Access (HSPA+), Long Term Evolution (LTE), AMPS, 5G New Radio (NR), or other known signals that are used to communicate within a wireless, cellular or internet of things (loT) network.
Advantages of Invention;
1- The proposed algorithm can provide security without conventional cryptography-based methods thus avoiding key sharing, distribution, and management issues for future networks.
2- The proposed algorithm can be implemented to provide flexible and scenario-specific security by securing data only, pilots only or jointly data and pilots.
3- Compared to conventional PLS method the proposed algorithm can provide security without degrading the BER performance of a legitimate node, causing an increase in the PAPR at the transmitter, causing a loss in spectral efficiency, and sacrificing power for noise. The design is based on decomposing the channel into all-pass and minimum phase channels and exploiting the property of decomposed channels to provide security.
4- The proposed algorithm can provide security for pilot such that the attacker cannot learn the correct pilots, thus he cannot learn the environment.
5- The eavesdropper will not be able extract information of precoder corresponding to legitimate nodes from received signal due to the pilot security.
6- The proposed algorithm can be implemented for hiding hardware impairments in RF-based PHY authentication.
7- The enclosed method is very suitable for feedback security in wireless networks.
8- The enclosed method can be used for PHY authentication.
9- The enclosed method provides security even in the case of co-located eavesdropper.
10- The enclosed method is applicable to single user, multiuser, single antenna, multi antenna, centralized, and distributed systems.
Definition of the Figures of the Invention
The figures have been used in order to further disclose the developed by the present invention which the figures have been described below:
Figure 1: System model.
Definitions of elements in figure 1:
EVE: Eavesdropper
ALICE: Legitimate transmitter
BOB: Legitimate receiver
H = HAP HMIN : Alice will decompose the channel H into all pass HAP and minimum phase HM,N components.
Hae = The channel observed at Eve from Alice
Hbe = The channel observed at Eve from Bob
As demonstrated in Figure 1, an OFDM system is considered that consists of a legitimate transmitter (Alice, {a}), legitimate receiver (Bob, {b}) and passive eavesdropper (Eve, {e}) that is trying to intercept the transmission between Alice and Bob. The channels observed at Alice from Bob H{ba}, Bob from Alice H{ab}, Eve from Bob H{be}, and Eve from Alice H{ae} are considered as multi-path slowly varying channels with exponentially decaying taps having Rayleigh fading distribution. Moreover, due to the channel reciprocity assumption, the channel between Alice-Bob H{ab} can be estimated from the channel between Bob-Alice H{ba}, where H{ab}=H_{ba}AT.
Detailed Description of the Invention
The novelty of the invention has been described with examples that shall not limit the scope of the invention and which have been intended to only clarify the subject matter of the invention. The present invention has been described in detail below.
Our proposed algorithm is based on novel utilization of minimum phase (MP) and all pass (AP) channel decomposition for providing pilot and data security. The MP and the AP components of the channel are used for designing secure PHY algorithms.
Channel decomposition:
The wireless channel has a Finite Impulse Response (FIR); therefore, it is stable. Additionally, wireless channel is a real-life system, it must be causal. These two conditions ensure that the channel can be decomposed to MP and AP channels as follows:
where H(z) is the transfer function of the channel, HMIN(z) and HAP(z) are the minimum phase and the allpass components of H(z), q denotes the number of zeros outside the unit circle and p is a complex number defined such that l/pk is the location of the system’s zeros. The zeros inside the unit circle are given inside the term ^(z).
For example, we assume that two legitimate parties Alice and Bob where Alice (transmitter) wants to communicate securely with Bob (receiver) in the presence of an eavesdropper Eve as shown in Fig.1. The PHY security algorithm is based on the channel state information (CSI) availability at Alice. Conventionally, CSI is available via uplink training where Bob sends known pilot signal to Alice for channel estimation and therefore CSI acquisition. In this case, Eve can learn the channel and environment between Bob and her.
The PHY security algorithm is based on the channel state information (CSI) availability at Alice, which is used for providing security for data or pilot or jointly data and pilot.
Algorithm I: Pilot security:
Stepl: In the first step, Alice will decompose the channel into all pass and minimum phase components (H => HAP HM,N ).
Step2: Afterwards, it multiplies the pilot signal (P) with the allpass component of channel as T = HAP P and transmits towards Bob.
Step3: The received signal at Bob can be given as /?x = H. HAP P. Using channel decomposition concept, the received signal can be rewritten as R1=HAP HMIN HAP P = HMIN (_HAP )2P.
Step4: The estimated channel can be decomposed into all pass ,HAPb )2 and minimum phase HMPb . Finally, the estimated channel at Bob can be given as
Step5: Note that
= i^AP- however, we exploit the continuity of the channel response to define the sign of the estimated channel.
Note that due to proposed algorithm only legitimate node will be able to estimate the channel while attacker will not be able to estimate her channel. Particularly, due to channel decorrelation assumption, the channels observed by legitimate and illegitimate nodes are independent and hence make it very difficult for the attacker to estimate channel in case of proposed channel-dependent design.
Algorithm II: Data security
The basic steps for the data security algorithm are as follows:
Stepl: In the first step, Alice will decompose the channel into all pass and minimum phase components (H => HAP HMIN ).
Step2: Afterwards, it multiplies the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmits towards Bob.
Step3: The received signal at Bob can be given as R. Using channel decomposition concept, the
received signal can be rewritten as R=HAP HM,N = HM,N D.
Step4: Finally, Bob equalizes the HM,N to decode the data.
Note that due to our proposed algorithm only legitimate node will be able to estimate the channel while attacker will not be able to estimate her data. Particularly, due to channel decorrelation assumption, the channels observed by legitimate and illegitimate nodes are independent and hence made it very difficult for the attacker to estimate data in case of proposed channel dependent design, even she knows her channel.
Algorithm III: Joint Pilot & Data security:
Invention can also provide data and pilot security jointly. Consider a frame which consists of pilots (P) and data (£>).
Stepl: In the first step, Alice will decompose the channel into all pass and minimum phase components (H => HAP HM,N ).
Step2: Afterwards, it multiplies the pilot signal (P) with the allpass component of channel as T = HAP P and transmits towards Bob.
Step3: The received signal at Bob can be given as Px = H. HAP P. Using channel decomposition concept, the received signal can be rewritten as R =HAP HM,N HAP P = HM,N (HAP )2P.
Step4: The estimated channel can be decomposed into all pass (HAP )2 and minimum phase HMPb . Finally, the estimated channel at Bob can be given as
Step5: Note that ^ (HAP)2 = +HAP, however, we exploit the continuity of the channel response to define the sign of the estimated channel.
Step6: Afterwards, it multiplies the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmits towards Bob.
Step7: The received signal at Bob can be given as R. Using channel decomposition concept, the
received signal can be rewritten asR=HAP HMIN = HMIN D.
HAP
Step8: Finally, Bob equalizes the HM,N to decode the data.
Depending on the all information above, the operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks comprising the steps of; First, decompose the channel into minimum phase and all-pass components. Afterwards, use the components of the channel intelligently to design algorithms for data and pilot security. An operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks comprising the steps of;
For pilot security process;
• Decomposing of the channel into all pass and minimum phase components (H => ^AP HMIN ) by legitimate transmitter,
• Multiplying the pilot signal (P) with the allpass component of channel as T = HAP P and transmitting towards legitimate receiver by legitimate transmitter,
• The receiving of the signal at legitimate receiver as R± = H. HAP P,
• Decomposing of the estimated channel into all pass ,HAPb )2 and minimum phase HMPb ,
• Estimating of the channel at legitimate receiver as Hb = / HAP)2HMIN.
For data security process;
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter
• Multiplying of the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmitting towards legitimate receiver,
• Receiving of signal at legitimate receiver as R,
Equalizing the HMIN to decode the data.by legitimate receiver
For Joint Pilot & Data security process:
• Decomposing of the channel into all pass and minimum phase components (H => ^AP HMIN ) by legitimate transmitter,
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter,
• The receiving of the signal at legitimate receiver as R± = H. HAP P,
• Decomposing of the estimated channel into all pass ,HAPb )2 and minimum phase HMPb ,
• Multiplying of the data (D) with the reciprocal of all pass components of the channel as 1/ HAP and transmitting towards legitimate receiver,
• Receiving of signal at legitimate receiver as R,
• Equalizing the HM,N to decode the data.by legitimate receiver.
Around these basic concepts, it is possible to develop several embodiments regarding the subject matter of the invention; therefore the invention cannot be limited to the examples disclosed herein, and the invention is essentially as defined in the claims.
It is obvious that a person skilled in the art can convey the novelty of the invention using similar embodiments and/or that such embodiments can be applied to other fields similar to those used in the related art. Therefore it is also obvious that these kinds of embodiments are void of the novelty criteria and the criteria of exceeding the known state of the art.
Industrial Application of the Invention
Present invention provides a method for protecting data and/or pilots in rich scattering channels against Eavesdropping attacks. The method of the invention can be implemented on any wireless technology to provide protection to data, pilots or jointly data and pilots against eavesdroppers.
Especially, standards like 3GPP -based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network are relevant to the invention due to the support of multipoint coordination provided in both standards. Furthermore, the method of the invention can be implemented on any device, system or network capable of supporting any of the aforementioned standards, for instance: code division multiple access (CMDA), frequency division multiple access (FDMA), Global System for Mobile communications (GSM), GSM/General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), Wideband-CDMA (W-CDMA), Evolution Data Optimized (EV-DO), High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), Evolved High Speed Packet Access (HSPA+), Long Term Evolution (LTE), AMPS, 5G New Radio (NR), or other known signals that are used to communicate within a wireless, cellular or internet of things (loT) network.
Also, future networks will need to support new wireless technologies such as 5G-Tactile Internet, Internet of Things (loT), Ultra-Reliable Low Latency Communication (ULLRC), remote surgery etc. however the devices used in these applications are naturally-power limited, processing restricted and delay-sensitive which makes the state of the art solutions unfeasible for meeting the requirements of such technologies.
The method of the invention has the potential to provide scenario specific security for future networks that are expected to support diverse services and scenarios with different security requirements.
Claims
CLAIMS An operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks, comprising
• decomposing channel into minimum phase and all-pass components and
• using the components of the channel to design algorithm for data and pilot security A method according to claim 1 for pilot security process comprising the steps of;
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter,
• Multiplying the pilot signal (P) with the allpass component of channel as Tx = HAP P and transmitting towards legitimate receiver by legitimate transmitter,
• Decomposing of the estimated channel into all pass (HAPt )2 and minimum phase H]V[Pb ,
• Estimating of the channel at legitimate receiver
A method according to claim 1 for data security process comprising the steps of;
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter
• Multiplying of the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmitting towards legitimate receiver,
• Receiving of signal at legitimate receiver as R,
• Equalizing the HMIN to decode the data.by legitimate receiver A method where algorithm is. A method according to claim l,for joint security process for both pilot and data comprising the steps of;
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter,
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter,
• The receiving of the signal at legitimate receiver as Rt = H. HAP P,
• Decomposing of the estimated channel into all pass (H Pb )2 and minimum phase H]V[Pb ,
• Multiplying of the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmitting towards legitimate receiver,
• Receiving of signal at legitimate receiver as R,
• Equalizing the HMIN to decode the data.by legitimate receiver. Use of a method according to any one of claims 1-5 to provide protection to data, pilots or jointly data and pilots against eavesdroppers in any wireless communication technology. Use of a method according to claim 6 wherein wireless communication technology is any device, system or network capable of supporting 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network that supports multipoint coordination provided in both 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks. Use of a method according to claim 7 wherein , device, system or network capable of supporting 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network that supports multipoint coordination provided in both 3GPP -based cellular and IEEE 802.11 based Wi-Fi networks is; code division multiple access (CMDA), frequency division multiple access (FDMA), Global System for Mobile communications (GSM), GSM/General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), Wideband-CDMA (W-CDMA), Evolution Data Optimized (EV-DO), High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), Evolved High Speed Packet Access (HSPA+), Long Term Evolution (LTE), AMPS, 5G New Radio (NR), or other known signals that are used to communicate within a wireless, cellular or internet of things (loT) network.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TR2021/019512A TR2021019512A2 (en) | 2021-12-09 | 2021-12-09 | CHANNEL SPLIT-BASED ADAPTIVE PHYSICAL LAYER SECURITY FOR FUTURE WIRELESS NETWORKS |
TRTR2021/019512 | 2021-12-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023107067A1 true WO2023107067A1 (en) | 2023-06-15 |
Family
ID=85117520
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/TR2022/051423 WO2023107067A1 (en) | 2021-12-09 | 2022-12-06 | Channel-decomposition based adaptive physical layer security |
Country Status (2)
Country | Link |
---|---|
TR (1) | TR2021019512A2 (en) |
WO (1) | WO2023107067A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117896176A (en) * | 2024-03-12 | 2024-04-16 | 西安电子科技大学 | Learning-driven physical layer authentication method for industrial Internet of things spoofing attack |
CN117896176B (en) * | 2024-03-12 | 2024-05-17 | 西安电子科技大学 | Learning-driven physical layer authentication method for industrial Internet of things spoofing attack |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111262803A (en) * | 2020-03-04 | 2020-06-09 | 广州番禺职业技术学院 | Physical layer secure communication method, device and system based on deep learning |
CN111988255A (en) * | 2020-07-15 | 2020-11-24 | 郑州轻工业大学 | Physical layer secure transmission method and system based on decomposition and distributed modulation |
WO2021154106A1 (en) * | 2020-01-31 | 2021-08-05 | Koala Tech, Lda | A method and an apparatus for physical layer in noma based wireless communication systems |
-
2021
- 2021-12-09 TR TR2021/019512A patent/TR2021019512A2/en unknown
-
2022
- 2022-12-06 WO PCT/TR2022/051423 patent/WO2023107067A1/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021154106A1 (en) * | 2020-01-31 | 2021-08-05 | Koala Tech, Lda | A method and an apparatus for physical layer in noma based wireless communication systems |
CN111262803A (en) * | 2020-03-04 | 2020-06-09 | 广州番禺职业技术学院 | Physical layer secure communication method, device and system based on deep learning |
CN111988255A (en) * | 2020-07-15 | 2020-11-24 | 郑州轻工业大学 | Physical layer secure transmission method and system based on decomposition and distributed modulation |
Non-Patent Citations (2)
Title |
---|
EDDINE ZEGRAR SALAH, AFEEF LIZA, ARSLAN HUSEYIN: "Reconfigurable intelligent surface (RIS): Eigenvalue Decomposition-Based Separate Channel Estimation", 2021 IEEE 32ND ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 13 September 2021 (2021-09-13), pages 1 - 6, XP093073090, ISBN: 978-1-7281-7586-7, DOI: 10.1109/PIMRC50174.2021.9569501 * |
SALAH EDDINE ZEGRAR; HAJI M. FURQAN; HUSEYIN ARSLAN: "Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks", ARXIV.ORG, 22 October 2021 (2021-10-22), pages 1 - 11, XP091080377 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117896176A (en) * | 2024-03-12 | 2024-04-16 | 西安电子科技大学 | Learning-driven physical layer authentication method for industrial Internet of things spoofing attack |
CN117896176B (en) * | 2024-03-12 | 2024-05-17 | 西安电子科技大学 | Learning-driven physical layer authentication method for industrial Internet of things spoofing attack |
Also Published As
Publication number | Publication date |
---|---|
TR2021019512A2 (en) | 2022-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hamamreh et al. | Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey | |
Li et al. | Index modulated OFDM spread spectrum | |
Güvenkaya et al. | On physical-layer concepts and metrics in secure signal transmission | |
Hamamreh et al. | Joint PHY/MAC layer security design using ARQ with MRC and null-space independent PAPR-aware artificial noise in SISO systems | |
Shah et al. | A novel physical layer security scheme in OFDM-based cognitive radio networks | |
Furqan et al. | Enhancing physical layer security of OFDM systems using channel shortening | |
Iraqi et al. | Efficient information transmission using smart OFDM for IoT applications | |
Furqan et al. | New physical layer key generation dimensions: Subcarrier indices/positions-based key generation | |
EP3732826A2 (en) | Automatic repeat/request system for providing absolute safety and authentication in wireless networks | |
Melki et al. | Physical layer security schemes for MIMO systems: an overview | |
Melki et al. | Physical layer security for NOMA: Limitations, issues, and recommendations | |
Wang et al. | Security-coded OFDM system based on multiorder fractional Fourier transform | |
Li et al. | A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception | |
Zia et al. | An advanced non-orthogonal multiple access security technique for future wireless communication networks | |
Komeylian et al. | Deploying an OFDM physical layer security with high rate data for 5G wireless networks | |
Wang et al. | High spectral efficiency and low error rate MIMO-GFDM for next-generation communication systems | |
Cui et al. | Multi-domain noma for isac: Utilizing the dof in the delay-doppler domain | |
WO2022031245A1 (en) | A communication system with multiple-input single-output non-orthogonal multiple access (miso-noma) system and its communication method | |
Liu et al. | Sparse space-time-frequency-domain spreading for large-scale non-orthogonal multiple access | |
Yu et al. | Performance of variable-power adaptive modulation with space–time coding and imperfect CSI in MIMO systems | |
Naderi et al. | Channel randomness-based adaptive cyclic prefix selection for secure ofdm system | |
Başar | Index modulation: A promising technique for 5G and beyond wireless networks | |
WO2023107067A1 (en) | Channel-decomposition based adaptive physical layer security | |
WO2023107078A1 (en) | Channel-decomposition based secure channel state information sharing for physical layer security for future wireless networks | |
Furqan et al. | Secure and reliable IoT communications using nonorthogonal Signals’ superposition with dual-transmission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22904830 Country of ref document: EP Kind code of ref document: A1 |