WO2023107067A1 - Channel-decomposition based adaptive physical layer security - Google Patents

Channel-decomposition based adaptive physical layer security Download PDF

Info

Publication number
WO2023107067A1
WO2023107067A1 PCT/TR2022/051423 TR2022051423W WO2023107067A1 WO 2023107067 A1 WO2023107067 A1 WO 2023107067A1 TR 2022051423 W TR2022051423 W TR 2022051423W WO 2023107067 A1 WO2023107067 A1 WO 2023107067A1
Authority
WO
WIPO (PCT)
Prior art keywords
channel
data
legitimate
pass
decomposing
Prior art date
Application number
PCT/TR2022/051423
Other languages
French (fr)
Inventor
Salah Eddine ZEGRAR
Haji Muhammad Furqan Ahmed MADNI
Hüseyin ARSLAN
Original Assignee
Istanbul Medipol Universitesi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Istanbul Medipol Universitesi filed Critical Istanbul Medipol Universitesi
Publication of WO2023107067A1 publication Critical patent/WO2023107067A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/0202Channel estimation
    • H04L25/0224Channel estimation using sounding signals

Definitions

  • PLS physical layer security
  • key generation-based approaches include key generation-based approaches, adaptive communication-based approaches, artificial noise-based techniques, and waveform features concealing techniques.
  • Key generation-based techniques are based on the exploitation of channel reciprocity property between legitimate nodes as a common source of randomness. For example, amplitude and phase related to received signal strength (RSS), channel impulse response (CIR), channel frequency response (CFR), and other feedbacks can be used for key generation .
  • RSS received signal strength
  • CIR channel impulse response
  • CFR channel frequency response
  • Other feedbacks can be used for key generation .
  • the parameters are adjusted/adapted based on the location, channel conditions, and quality-of-service (QoS) requirements of the legitimate receiver only.
  • QoS quality-of-service
  • pre- equalization-based techniques which provide security but result in high peak to average power ratio (PAPR)
  • PAPR peak to average power ratio
  • sub-carrier selection-based techniques provide security at the cost of loss in spectral efficiency.
  • an interference signal is added by the trusted node to degrade the performance of a legitimate node without affecting the performance of the legitimate receiver.
  • the interference signal may cause an increase in PAPR and little power degradation due to the sacrifice of the power resources for noise generation.
  • pilot tone manipulation Several techniques have been proposed in the literature to ensure the security of reference signals including pilot tone manipulation, artificial noise embedding and anti-eavesdropping pilot design.
  • the phases of pilots are rotated based on preceding instantaneous channel information of subcarriers at the transmitter. This deteriorates the eavesdropping capability during the channel estimation phase, where only the intended receiver can estimate the channel correctly.
  • artificial noise is embedded in the pilot signal based on the uplink CSI to degrade the channel estimation performance at the attacker during downlink pilot transmission.
  • the pilots from the legitimate nodes are designed in such a way that the composite pilot matrix has a full rank for legitimate nodes while having rank deficiency with respect to the attacker. This ensures that the attacker cannot observe the subspace of its CSI using the legitimate pilots.
  • the present invention is related to a method for channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks in order to eliminate the disadvantages mentioned above and to bring new advantages to the related technical field.
  • This invention provides a novel channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks.
  • PLS physical layer security
  • the proposed algorithms can provide secure and efficient communication without depending on the conventional cryptography-based security solutions. More specifically, the proposed algorithm that is based on physical layer (PHY) security concept can solve the following problems related to conventional security:
  • Future networks need to support new wireless technologies like 5G-Tactile Internet, Internet of Things (loT), Ultra-Reliable Low Latency Communication (ULLRC), remote surgery.
  • LoT Internet of Things
  • UDLRC Ultra-Reliable Low Latency Communication
  • the devices used in these applications are naturally power-limited, processing-restricted and delay-sensitive which make cryptography-based techniques unfeasible for such type of technologies.
  • the attacker can learn about the environment if the pilots are not secured. Moreover, sending pilots can also enable the attacker to learn about the precoder designed at the legitimate transmitter which leads to leakage of channel state information of legitimate nodes to the attacker as mentioned in prior art,
  • Any wireless communication technology can utilize this invention to provide protection to data, pilots or jointly data and pilots against eavesdroppers.
  • standards like 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network are particularly relevant to the invention due to the support of multipoint coordination provided in both standards.
  • CMDA code division multiple access
  • FDMA frequency division multiple access
  • GSM Global System for Mobile communications
  • GPRS GSM/General Packet Radio Service
  • EDGE Enhanced Data GSM Environment
  • W-CDMA Wideband-CDMA
  • EV-DO Evolution Data Optimized
  • HSPA High Speed Packet Access
  • HSDPA High Speed Downlink Packet Access
  • HSUPA High Speed Uplink Packet Access
  • Evolved High Speed Packet Access HSPA+
  • LTE Long Term Evolution
  • AMPS 5G New Radio (NR)
  • NR 5G New Radio
  • the proposed algorithm can provide security without conventional cryptography-based methods thus avoiding key sharing, distribution, and management issues for future networks.
  • the proposed algorithm can be implemented to provide flexible and scenario-specific security by securing data only, pilots only or jointly data and pilots.
  • the proposed algorithm can provide security without degrading the BER performance of a legitimate node, causing an increase in the PAPR at the transmitter, causing a loss in spectral efficiency, and sacrificing power for noise.
  • the design is based on decomposing the channel into all-pass and minimum phase channels and exploiting the property of decomposed channels to provide security.
  • the proposed algorithm can provide security for pilot such that the attacker cannot learn the correct pilots, thus he cannot learn the environment.
  • the eavesdropper will not be able extract information of precoder corresponding to legitimate nodes from received signal due to the pilot security.
  • the proposed algorithm can be implemented for hiding hardware impairments in RF-based PHY authentication.
  • the enclosed method provides security even in the case of co-located eavesdropper.
  • the enclosed method is applicable to single user, multiuser, single antenna, multi antenna, centralized, and distributed systems.
  • Figure 1 System model.
  • H H AP H M IN : Alice will decompose the channel H into all pass H AP and minimum phase H M , N components.
  • H ae The channel observed at Eve from Alice
  • Hbe The channel observed at Eve from Bob
  • an OFDM system is considered that consists of a legitimate transmitter (Alice, ⁇ a ⁇ ), legitimate receiver (Bob, ⁇ b ⁇ ) and passive eavesdropper (Eve, ⁇ e ⁇ ) that is trying to intercept the transmission between Alice and Bob.
  • the channels observed at Alice from Bob H ⁇ ba ⁇ , Bob from Alice H ⁇ ab ⁇ , Eve from Bob H ⁇ be ⁇ , and Eve from Alice H ⁇ ae ⁇ are considered as multi-path slowly varying channels with exponentially decaying taps having Rayleigh fading distribution.
  • Our proposed algorithm is based on novel utilization of minimum phase (MP) and all pass (AP) channel decomposition for providing pilot and data security.
  • MP minimum phase
  • AP all pass
  • the wireless channel has a Finite Impulse Response (FIR); therefore, it is stable. Additionally, wireless channel is a real-life system, it must be causal. These two conditions ensure that the channel can be decomposed to MP and AP channels as follows: where H(z) is the transfer function of the channel, H MIN (z) and H AP (z) are the minimum phase and the allpass components of H(z), q denotes the number of zeros outside the unit circle and p is a complex number defined such that l/p k is the location of the system’s zeros. The zeros inside the unit circle are given inside the term ⁇ (z).
  • FIR Finite Impulse Response
  • CSI channel state information
  • the PHY security algorithm is based on the channel state information (CSI) availability at Alice, which is used for providing security for data or pilot or jointly data and pilot.
  • CSI channel state information
  • Step4 The estimated channel can be decomposed into all pass ,H APb ) 2 and minimum phase H MPb . Finally, the estimated channel at Bob can be given as
  • Step2 Afterwards, it multiplies the data (D) with the reciprocal of all pass components of the channel as 1/H AP and transmits towards Bob.
  • Step4 Finally, Bob equalizes the H M , N to decode the data.
  • Invention can also provide data and pilot security jointly.
  • a frame which consists of pilots (P) and data (£>).
  • Step4 The estimated channel can be decomposed into all pass (H AP ) 2 and minimum phase H MPb . Finally, the estimated channel at Bob can be given as
  • Step6 Afterwards, it multiplies the data (D) with the reciprocal of all pass components of the channel as 1/H AP and transmits towards Bob.
  • Step7 The received signal at Bob can be given as R.
  • Step8 Finally, Bob equalizes the H M , N to decode the data.
  • the operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks comprising the steps of; First, decompose the channel into minimum phase and all-pass components. Afterwards, use the components of the channel intelligently to design algorithms for data and pilot security.
  • An operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks comprising the steps of;
  • the Industrial Application of the Invention Present invention provides a method for protecting data and/or pilots in rich scattering channels against Eavesdropping attacks.
  • the method of the invention can be implemented on any wireless technology to provide protection to data, pilots or jointly data and pilots against eavesdroppers.
  • CMDA code division multiple access
  • FDMA frequency division multiple access
  • GSM Global System for Mobile communications
  • GPRS GSM/General Packet Radio Service
  • EDGE Enhanced Data GSM Environment
  • W-CDMA Wideband-CDMA
  • EV-DO Evolution Data Optimized
  • HSPA High Speed Packet Access
  • HSDPA High Speed Downlink Packet Access
  • HSUPA High Speed Uplink Packet Access
  • Evolved High Speed Packet Access HSPA+
  • LTE Long Term Evolution
  • AMPS 5G New Radio (NR)
  • NR 5G New Radio
  • the method of the invention has the potential to provide scenario specific security for future networks that are expected to support diverse services and scenarios with different security requirements.

Abstract

In this invention, channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks is proposed.

Description

CHANNEL-DECOMPOSITION BASED ADAPTIVE PHYSICAL LAYER SECURITY FOR FUTURE WIRELESS NETWORKS
Technical Field
In this invention, channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks is proposed.
Prior Art
Among the top areas in physical layer security (PLS), securing communication in rich scattering channels has drawn enormous attention recently. Different security techniques have been proposed in the literature. These techniques include key generation-based approaches, adaptive communication-based approaches, artificial noise-based techniques, and waveform features concealing techniques. Key generation-based techniques are based on the exploitation of channel reciprocity property between legitimate nodes as a common source of randomness. For example, amplitude and phase related to received signal strength (RSS), channel impulse response (CIR), channel frequency response (CFR), and other feedbacks can be used for key generation . These techniques are interesting in the sense that they can solve the problems faced by conventional cryptography-based algorithms related to key management and distribution in future heterogeneous wireless networks. However, they are very sensitive to reciprocity mismatch and channel estimation error especially at low signal-to-noise ratio (SNR). In adaptive transmission-based techniques, the parameters are adjusted/adapted based on the location, channel conditions, and quality-of-service (QoS) requirements of the legitimate receiver only. For example, pre- equalization-based techniques which provide security but result in high peak to average power ratio (PAPR), sub-carrier selection-based techniques provide security at the cost of loss in spectral efficiency. In an artificial noise-based technique, an interference signal is added by the trusted node to degrade the performance of a legitimate node without affecting the performance of the legitimate receiver. However, the interference signal may cause an increase in PAPR and little power degradation due to the sacrifice of the power resources for noise generation. Several techniques have been proposed in the literature to ensure the security of reference signals including pilot tone manipulation, artificial noise embedding and anti-eavesdropping pilot design. In prior art, the phases of pilots are rotated based on preceding instantaneous channel information of subcarriers at the transmitter. This deteriorates the eavesdropping capability during the channel estimation phase, where only the intended receiver can estimate the channel correctly. In prior art, artificial noise is embedded in the pilot signal based on the uplink CSI to degrade the channel estimation performance at the attacker during downlink pilot transmission. Particularly, the pilots from the legitimate nodes are designed in such a way that the composite pilot matrix has a full rank for legitimate nodes while having rank deficiency with respect to the attacker. This ensures that the attacker cannot observe the subspace of its CSI using the legitimate pilots.
Aims of the Invention and Brief Description
The present invention is related to a method for channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks in order to eliminate the disadvantages mentioned above and to bring new advantages to the related technical field.
This invention provides a novel channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks.
The broadcast nature of wireless communication renders it prone to various security threats. One of these threats is the violation of confidentiality of communication, also referred to as eavesdropping. In this case, a malicious node/device tries to intercept and interpret the communication going on between two legitimate nodes. Conventionally, security techniques in the upper layers, such as cryptography-based techniques, have been employed for secure transmission. However, such security techniques may not be adequate for future (5G and beyond) decentralized and heterogeneous networks due to the increased complexity of key management and sharing mechanisms. Keeping this in mind, physical layer security (PLS) mechanisms such as the one mentioned in this invention have become increasingly popular in recent years.
The proposed algorithms can provide secure and efficient communication without depending on the conventional cryptography-based security solutions. More specifically, the proposed algorithm that is based on physical layer (PHY) security concept can solve the following problems related to conventional security:
1.
1. Future networks need to support new wireless technologies like 5G-Tactile Internet, Internet of Things (loT), Ultra-Reliable Low Latency Communication (ULLRC), remote surgery. However, the devices used in these applications are naturally power-limited, processing-restricted and delay-sensitive which make cryptography-based techniques unfeasible for such type of technologies.
2. Future networks are expected to support diverse services and scenarios that have different security requirements. The encryption-based method cannot provide scenario specific security.
3. The attacker can learn about the environment if the pilots are not secured. Moreover, sending pilots can also enable the attacker to learn about the precoder designed at the legitimate transmitter which leads to leakage of channel state information of legitimate nodes to the attacker as mentioned in prior art,
4. Most of the PHY security algorithms assume the channel to known at both nodes of transmission (or at least at one side). At the stage of estimating and feedbacking the channel the security is very vulnerable to eavesdropper, and if attacker learned the channel the PHY security algorithm can be cracked.
Any wireless communication technology can utilize this invention to provide protection to data, pilots or jointly data and pilots against eavesdroppers. However, standards like 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network are particularly relevant to the invention due to the support of multipoint coordination provided in both standards. Furthermore, the described method in this invention can be implemented on any device, system or network capable of supporting any of the aforementioned standards, for instance: code division multiple access (CMDA), frequency division multiple access (FDMA), Global System for Mobile communications (GSM), GSM/General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), Wideband-CDMA (W-CDMA), Evolution Data Optimized (EV-DO), High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), Evolved High Speed Packet Access (HSPA+), Long Term Evolution (LTE), AMPS, 5G New Radio (NR), or other known signals that are used to communicate within a wireless, cellular or internet of things (loT) network.
Advantages of Invention;
1- The proposed algorithm can provide security without conventional cryptography-based methods thus avoiding key sharing, distribution, and management issues for future networks.
2- The proposed algorithm can be implemented to provide flexible and scenario-specific security by securing data only, pilots only or jointly data and pilots.
3- Compared to conventional PLS method the proposed algorithm can provide security without degrading the BER performance of a legitimate node, causing an increase in the PAPR at the transmitter, causing a loss in spectral efficiency, and sacrificing power for noise. The design is based on decomposing the channel into all-pass and minimum phase channels and exploiting the property of decomposed channels to provide security.
4- The proposed algorithm can provide security for pilot such that the attacker cannot learn the correct pilots, thus he cannot learn the environment.
5- The eavesdropper will not be able extract information of precoder corresponding to legitimate nodes from received signal due to the pilot security.
6- The proposed algorithm can be implemented for hiding hardware impairments in RF-based PHY authentication.
7- The enclosed method is very suitable for feedback security in wireless networks.
8- The enclosed method can be used for PHY authentication.
9- The enclosed method provides security even in the case of co-located eavesdropper. 10- The enclosed method is applicable to single user, multiuser, single antenna, multi antenna, centralized, and distributed systems.
Definition of the Figures of the Invention
The figures have been used in order to further disclose the developed by the present invention which the figures have been described below:
Figure 1: System model.
Definitions of elements in figure 1:
EVE: Eavesdropper
ALICE: Legitimate transmitter
BOB: Legitimate receiver
H = HAP HMIN : Alice will decompose the channel H into all pass HAP and minimum phase HM,N components.
Hae = The channel observed at Eve from Alice
Hbe = The channel observed at Eve from Bob
As demonstrated in Figure 1, an OFDM system is considered that consists of a legitimate transmitter (Alice, {a}), legitimate receiver (Bob, {b}) and passive eavesdropper (Eve, {e}) that is trying to intercept the transmission between Alice and Bob. The channels observed at Alice from Bob H{ba}, Bob from Alice H{ab}, Eve from Bob H{be}, and Eve from Alice H{ae} are considered as multi-path slowly varying channels with exponentially decaying taps having Rayleigh fading distribution. Moreover, due to the channel reciprocity assumption, the channel between Alice-Bob H{ab} can be estimated from the channel between Bob-Alice H{ba}, where H{ab}=H_{ba}AT.
Detailed Description of the Invention The novelty of the invention has been described with examples that shall not limit the scope of the invention and which have been intended to only clarify the subject matter of the invention. The present invention has been described in detail below.
Our proposed algorithm is based on novel utilization of minimum phase (MP) and all pass (AP) channel decomposition for providing pilot and data security. The MP and the AP components of the channel are used for designing secure PHY algorithms.
Channel decomposition:
The wireless channel has a Finite Impulse Response (FIR); therefore, it is stable. Additionally, wireless channel is a real-life system, it must be causal. These two conditions ensure that the channel can be decomposed to MP and AP channels as follows:
Figure imgf000008_0001
where H(z) is the transfer function of the channel, HMIN(z) and HAP(z) are the minimum phase and the allpass components of H(z), q denotes the number of zeros outside the unit circle and p is a complex number defined such that l/pk is the location of the system’s zeros. The zeros inside the unit circle are given inside the term ^(z).
For example, we assume that two legitimate parties Alice and Bob where Alice (transmitter) wants to communicate securely with Bob (receiver) in the presence of an eavesdropper Eve as shown in Fig.1. The PHY security algorithm is based on the channel state information (CSI) availability at Alice. Conventionally, CSI is available via uplink training where Bob sends known pilot signal to Alice for channel estimation and therefore CSI acquisition. In this case, Eve can learn the channel and environment between Bob and her.
The PHY security algorithm is based on the channel state information (CSI) availability at Alice, which is used for providing security for data or pilot or jointly data and pilot. Algorithm I: Pilot security:
Stepl: In the first step, Alice will decompose the channel into all pass and minimum phase components (H => HAP HM,N ).
Step2: Afterwards, it multiplies the pilot signal (P) with the allpass component of channel as T = HAP P and transmits towards Bob.
Step3: The received signal at Bob can be given as /?x = H. HAP P. Using channel decomposition concept, the received signal can be rewritten as R1=HAP HMIN HAP P = HMIN (_HAP )2P.
Step4: The estimated channel can be decomposed into all pass ,HAPb )2 and minimum phase HMPb . Finally, the estimated channel at Bob can be given as
Figure imgf000009_0001
Step5: Note that
Figure imgf000009_0002
= i^AP- however, we exploit the continuity of the channel response to define the sign of the estimated channel.
Note that due to proposed algorithm only legitimate node will be able to estimate the channel while attacker will not be able to estimate her channel. Particularly, due to channel decorrelation assumption, the channels observed by legitimate and illegitimate nodes are independent and hence make it very difficult for the attacker to estimate channel in case of proposed channel-dependent design.
Algorithm II: Data security
The basic steps for the data security algorithm are as follows:
Stepl: In the first step, Alice will decompose the channel into all pass and minimum phase components (H => HAP HMIN ).
Step2: Afterwards, it multiplies the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmits towards Bob. Step3: The received signal at Bob can be given as R. Using channel decomposition concept, the
Figure imgf000010_0001
received signal can be rewritten as R=HAP HM,N = HM,N D.
Figure imgf000010_0002
Step4: Finally, Bob equalizes the HM,N to decode the data.
Note that due to our proposed algorithm only legitimate node will be able to estimate the channel while attacker will not be able to estimate her data. Particularly, due to channel decorrelation assumption, the channels observed by legitimate and illegitimate nodes are independent and hence made it very difficult for the attacker to estimate data in case of proposed channel dependent design, even she knows her channel.
Algorithm III: Joint Pilot & Data security:
Invention can also provide data and pilot security jointly. Consider a frame which consists of pilots (P) and data (£>).
Stepl: In the first step, Alice will decompose the channel into all pass and minimum phase components (H => HAP HM,N ).
Step2: Afterwards, it multiplies the pilot signal (P) with the allpass component of channel as T = HAP P and transmits towards Bob.
Step3: The received signal at Bob can be given as Px = H. HAP P. Using channel decomposition concept, the received signal can be rewritten as R =HAP HM,N HAP P = HM,N (HAP )2P.
Step4: The estimated channel can be decomposed into all pass (HAP )2 and minimum phase HMPb . Finally, the estimated channel at Bob can be given as
Figure imgf000010_0003
Step5: Note that ^ (HAP)2 = +HAP, however, we exploit the continuity of the channel response to define the sign of the estimated channel. Step6: Afterwards, it multiplies the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmits towards Bob.
Step7: The received signal at Bob can be given as R. Using channel decomposition concept, the
Figure imgf000011_0001
received signal can be rewritten asR=HAP HMIN = HMIN D.
HAP
Step8: Finally, Bob equalizes the HM,N to decode the data.
Depending on the all information above, the operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks comprising the steps of; First, decompose the channel into minimum phase and all-pass components. Afterwards, use the components of the channel intelligently to design algorithms for data and pilot security. An operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks comprising the steps of;
For pilot security process;
• Decomposing of the channel into all pass and minimum phase components (H => ^AP HMIN ) by legitimate transmitter,
• Multiplying the pilot signal (P) with the allpass component of channel as T = HAP P and transmitting towards legitimate receiver by legitimate transmitter,
• The receiving of the signal at legitimate receiver as R± = H. HAP P,
• Decomposing of the estimated channel into all pass ,HAPb )2 and minimum phase HMPb ,
• Estimating of the channel at legitimate receiver as Hb = / HAP)2HMIN.
For data security process;
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter
• Multiplying of the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmitting towards legitimate receiver,
• Receiving of signal at legitimate receiver as R, Equalizing the HMIN to decode the data.by legitimate receiver
For Joint Pilot & Data security process:
• Decomposing of the channel into all pass and minimum phase components (H => ^AP HMIN ) by legitimate transmitter,
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter,
• The receiving of the signal at legitimate receiver as R± = H. HAP P,
• Decomposing of the estimated channel into all pass ,HAPb )2 and minimum phase HMPb ,
• Estimating of the channel at legitimate receiver as Hb
Figure imgf000012_0001
• Multiplying of the data (D) with the reciprocal of all pass components of the channel as 1/ HAP and transmitting towards legitimate receiver,
• Receiving of signal at legitimate receiver as R,
• Equalizing the HM,N to decode the data.by legitimate receiver.
Around these basic concepts, it is possible to develop several embodiments regarding the subject matter of the invention; therefore the invention cannot be limited to the examples disclosed herein, and the invention is essentially as defined in the claims.
It is obvious that a person skilled in the art can convey the novelty of the invention using similar embodiments and/or that such embodiments can be applied to other fields similar to those used in the related art. Therefore it is also obvious that these kinds of embodiments are void of the novelty criteria and the criteria of exceeding the known state of the art.
Industrial Application of the Invention Present invention provides a method for protecting data and/or pilots in rich scattering channels against Eavesdropping attacks. The method of the invention can be implemented on any wireless technology to provide protection to data, pilots or jointly data and pilots against eavesdroppers.
Especially, standards like 3GPP -based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network are relevant to the invention due to the support of multipoint coordination provided in both standards. Furthermore, the method of the invention can be implemented on any device, system or network capable of supporting any of the aforementioned standards, for instance: code division multiple access (CMDA), frequency division multiple access (FDMA), Global System for Mobile communications (GSM), GSM/General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), Wideband-CDMA (W-CDMA), Evolution Data Optimized (EV-DO), High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), Evolved High Speed Packet Access (HSPA+), Long Term Evolution (LTE), AMPS, 5G New Radio (NR), or other known signals that are used to communicate within a wireless, cellular or internet of things (loT) network.
Also, future networks will need to support new wireless technologies such as 5G-Tactile Internet, Internet of Things (loT), Ultra-Reliable Low Latency Communication (ULLRC), remote surgery etc. however the devices used in these applications are naturally-power limited, processing restricted and delay-sensitive which makes the state of the art solutions unfeasible for meeting the requirements of such technologies.
The method of the invention has the potential to provide scenario specific security for future networks that are expected to support diverse services and scenarios with different security requirements.

Claims

CLAIMS An operation method of channel-based mechanism to protect data as well as pilots in rich scattering channels against Eavesdropping attacks, comprising
• decomposing channel into minimum phase and all-pass components and
• using the components of the channel to design algorithm for data and pilot security A method according to claim 1 for pilot security process comprising the steps of;
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter,
• Multiplying the pilot signal (P) with the allpass component of channel as Tx = HAP P and transmitting towards legitimate receiver by legitimate transmitter,
• The receiving of the signal at legitimate receiver
Figure imgf000014_0001
= H. HAP P,
• Decomposing of the estimated channel into all pass (HAPt )2 and minimum phase H]V[Pb ,
• Estimating of the channel at legitimate receiver
Figure imgf000014_0002
A method according to claim 1 for data security process comprising the steps of;
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter
• Multiplying of the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmitting towards legitimate receiver,
• Receiving of signal at legitimate receiver as R,
• Equalizing the HMIN to decode the data.by legitimate receiver A method where algorithm is. A method according to claim l,for joint security process for both pilot and data comprising the steps of;
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter,
• Decomposing of the channel into all pass and minimum phase components (H => HAP HMIN ) by legitimate transmitter,
• The receiving of the signal at legitimate receiver as Rt = H. HAP P, • Decomposing of the estimated channel into all pass (H Pb )2 and minimum phase H]V[Pb ,
• Estimating of the channel at legitimate receiver as
Figure imgf000015_0001
HAp)2HMIN,
• Multiplying of the data (D) with the reciprocal of all pass components of the channel as 1/HAP and transmitting towards legitimate receiver,
• Receiving of signal at legitimate receiver as R,
• Equalizing the HMIN to decode the data.by legitimate receiver. Use of a method according to any one of claims 1-5 to provide protection to data, pilots or jointly data and pilots against eavesdroppers in any wireless communication technology. Use of a method according to claim 6 wherein wireless communication technology is any device, system or network capable of supporting 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network that supports multipoint coordination provided in both 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks. Use of a method according to claim 7 wherein , device, system or network capable of supporting 3GPP-based cellular and IEEE 802.11 based Wi-Fi networks, or any wireless network that supports multipoint coordination provided in both 3GPP -based cellular and IEEE 802.11 based Wi-Fi networks is; code division multiple access (CMDA), frequency division multiple access (FDMA), Global System for Mobile communications (GSM), GSM/General Packet Radio Service (GPRS), Enhanced Data GSM Environment (EDGE), Wideband-CDMA (W-CDMA), Evolution Data Optimized (EV-DO), High Speed Packet Access (HSPA), High Speed Downlink Packet Access (HSDPA), High Speed Uplink Packet Access (HSUPA), Evolved High Speed Packet Access (HSPA+), Long Term Evolution (LTE), AMPS, 5G New Radio (NR), or other known signals that are used to communicate within a wireless, cellular or internet of things (loT) network.
PCT/TR2022/051423 2021-12-09 2022-12-06 Channel-decomposition based adaptive physical layer security WO2023107067A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TR2021/019512A TR2021019512A2 (en) 2021-12-09 2021-12-09 CHANNEL SPLIT-BASED ADAPTIVE PHYSICAL LAYER SECURITY FOR FUTURE WIRELESS NETWORKS
TRTR2021/019512 2021-12-09

Publications (1)

Publication Number Publication Date
WO2023107067A1 true WO2023107067A1 (en) 2023-06-15

Family

ID=85117520

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/TR2022/051423 WO2023107067A1 (en) 2021-12-09 2022-12-06 Channel-decomposition based adaptive physical layer security

Country Status (2)

Country Link
TR (1) TR2021019512A2 (en)
WO (1) WO2023107067A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117896176A (en) * 2024-03-12 2024-04-16 西安电子科技大学 Learning-driven physical layer authentication method for industrial Internet of things spoofing attack
CN117896176B (en) * 2024-03-12 2024-05-17 西安电子科技大学 Learning-driven physical layer authentication method for industrial Internet of things spoofing attack

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111262803A (en) * 2020-03-04 2020-06-09 广州番禺职业技术学院 Physical layer secure communication method, device and system based on deep learning
CN111988255A (en) * 2020-07-15 2020-11-24 郑州轻工业大学 Physical layer secure transmission method and system based on decomposition and distributed modulation
WO2021154106A1 (en) * 2020-01-31 2021-08-05 Koala Tech, Lda A method and an apparatus for physical layer in noma based wireless communication systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021154106A1 (en) * 2020-01-31 2021-08-05 Koala Tech, Lda A method and an apparatus for physical layer in noma based wireless communication systems
CN111262803A (en) * 2020-03-04 2020-06-09 广州番禺职业技术学院 Physical layer secure communication method, device and system based on deep learning
CN111988255A (en) * 2020-07-15 2020-11-24 郑州轻工业大学 Physical layer secure transmission method and system based on decomposition and distributed modulation

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
EDDINE ZEGRAR SALAH, AFEEF LIZA, ARSLAN HUSEYIN: "Reconfigurable intelligent surface (RIS): Eigenvalue Decomposition-Based Separate Channel Estimation", 2021 IEEE 32ND ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 13 September 2021 (2021-09-13), pages 1 - 6, XP093073090, ISBN: 978-1-7281-7586-7, DOI: 10.1109/PIMRC50174.2021.9569501 *
SALAH EDDINE ZEGRAR; HAJI M. FURQAN; HUSEYIN ARSLAN: "Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks", ARXIV.ORG, 22 October 2021 (2021-10-22), pages 1 - 11, XP091080377 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117896176A (en) * 2024-03-12 2024-04-16 西安电子科技大学 Learning-driven physical layer authentication method for industrial Internet of things spoofing attack
CN117896176B (en) * 2024-03-12 2024-05-17 西安电子科技大学 Learning-driven physical layer authentication method for industrial Internet of things spoofing attack

Also Published As

Publication number Publication date
TR2021019512A2 (en) 2022-02-21

Similar Documents

Publication Publication Date Title
Hamamreh et al. Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey
Li et al. Index modulated OFDM spread spectrum
Güvenkaya et al. On physical-layer concepts and metrics in secure signal transmission
Hamamreh et al. Joint PHY/MAC layer security design using ARQ with MRC and null-space independent PAPR-aware artificial noise in SISO systems
Shah et al. A novel physical layer security scheme in OFDM-based cognitive radio networks
Furqan et al. Enhancing physical layer security of OFDM systems using channel shortening
Iraqi et al. Efficient information transmission using smart OFDM for IoT applications
Furqan et al. New physical layer key generation dimensions: Subcarrier indices/positions-based key generation
EP3732826A2 (en) Automatic repeat/request system for providing absolute safety and authentication in wireless networks
Melki et al. Physical layer security schemes for MIMO systems: an overview
Melki et al. Physical layer security for NOMA: Limitations, issues, and recommendations
Wang et al. Security-coded OFDM system based on multiorder fractional Fourier transform
Li et al. A distributed differentially encoded OFDM scheme for asynchronous cooperative systems with low probability of interception
Zia et al. An advanced non-orthogonal multiple access security technique for future wireless communication networks
Komeylian et al. Deploying an OFDM physical layer security with high rate data for 5G wireless networks
Wang et al. High spectral efficiency and low error rate MIMO-GFDM for next-generation communication systems
Cui et al. Multi-domain noma for isac: Utilizing the dof in the delay-doppler domain
WO2022031245A1 (en) A communication system with multiple-input single-output non-orthogonal multiple access (miso-noma) system and its communication method
Liu et al. Sparse space-time-frequency-domain spreading for large-scale non-orthogonal multiple access
Yu et al. Performance of variable-power adaptive modulation with space–time coding and imperfect CSI in MIMO systems
Naderi et al. Channel randomness-based adaptive cyclic prefix selection for secure ofdm system
Başar Index modulation: A promising technique for 5G and beyond wireless networks
WO2023107067A1 (en) Channel-decomposition based adaptive physical layer security
WO2023107078A1 (en) Channel-decomposition based secure channel state information sharing for physical layer security for future wireless networks
Furqan et al. Secure and reliable IoT communications using nonorthogonal Signals’ superposition with dual-transmission

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22904830

Country of ref document: EP

Kind code of ref document: A1