scholarly journals Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Liuguo Yin ◽  
Wentao Hao

Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC) codes and automatic repeat-request (ARQ) mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve), the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER) of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.

Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 497 ◽  
Author(s):  
Guyue Li ◽  
Chen Sun ◽  
Junqing Zhang ◽  
Eduard Jorswieck ◽  
Bin Xiao ◽  
...  

The fifth generation (5G) and beyond wireless communications will transform many exciting applications and trigger massive data connections with private, confidential, and sensitive information. The security of wireless communications is conventionally established by cryptographic schemes and protocols in which the secret key distribution is one of the essential primitives. However, traditional cryptography-based key distribution protocols might be challenged in the 5G and beyond communications because of special features such as device-to-device and heterogeneous communications, and ultra-low latency requirements. Channel reciprocity-based key generation (CRKG) is an emerging physical layer-based technique to establish secret keys between devices. This article reviews CRKG when the 5G and beyond networks employ three candidate technologies: duplex modes, massive multiple-input multiple-output (MIMO) and mmWave communications. We identify the opportunities and challenges for CRKG and provide corresponding solutions. To further demonstrate the feasibility of CRKG in practical communication systems, we overview existing prototypes with different IoT protocols and examine their performance in real-world environments. This article shows the feasibility and promising performances of CRKG with the potential to be commercialized.


2020 ◽  
Vol 8 (1) ◽  
pp. 140-160
Author(s):  
Inka Trisna Dewi ◽  
Amang Sudarsono ◽  
Prima Kristalina ◽  
Mike Yuliana

One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize the characteristics of wireless channels have been implemented. However, existing schemes still produce a low bit formation rate (BFR) even though they can reach a low bit error rate (BER). Note that V2V communication requires a scheme with high BFR in order to fulfill its main goal of improving road safety. In this research, we propose a higher rate secret key formation (HRKF) scheme using received signal strength (RSS) as a source of random information. The focus of this research is to produce keys with high BFR without compromising BER. To reduce bit mismatch, we propose a polynomial regression method that can increase channel reciprocity. We also propose a fixed threshold quantization (FTQ) method to maintain the number of bits so that the BFR increases. The test results show that the HRKF scheme can increase BFR from 40% up to 100% compared to existing research schemes. To ensure the key cannot be guessed by the attacker, the HRKF scheme succeeds in producing a key that meets the randomness of the NIST test.


The difficulties of privacy and security in WANETs have taken on a step by step more vital responsibility as those networks persist to increase their role globally. Historically, physical layer is regarded as biased function addressed below the security, and all broadly used cryptographic protocols like Rivest-Shamir–adlemen, Advanced encryption standard and Data Encryption standard are developed and applied assuming an error-free physical layer already exists . Contrasting the traditional cryptography hwhich neglects distinction among the communication channels, the current physical layer safety accomplish data protection using well designing channel code consistent with the channel capacities assuming that the authentic data can never be recovered. The standard system protection makes use of encryption and deciphering activities inside the application layer. Under any circumstances, this won't just construct the computational overhead of system. There's no actual way to avoid eavesdropper listening in and assault from the physical layer. Addressing this problem, this paper proposes a basic system model in which the cooperative relay broadcast channel with the user cooperation is introduced and the overall performance metrics based on the physical layer safety can viably enhance the system protection limit.


Author(s):  
Wang Dong ◽  
Hu Aiqun ◽  
Peng Linning

In this paper, a novel physical layer key generation method for extracting secret key from mutual channel information in orthogonal frequency division multiplexing (OFDM) systems has been proposed. Firstly, a well-designed data extraction process has been introduced to reduce the redundancy and inconsistency of channel state information (CSI). After that, a new quantization method using gray code is proposed. Furthermore, an associated method is designed to reduce key error rate (KER). With these improvements, higher key generation rate (KGR) can be obtained compared to existing methods. Finally, available secret keys have been generated after information reconciliation and privacy amplification. The proposed method has been analyzed and verified in long term evolution advanced (LTE-A) systems and the generated secret keys have passed randomness test.


2014 ◽  
Vol 602-605 ◽  
pp. 3223-3227
Author(s):  
Hua Xu

Low encoding delay and complexity is very important for image transmission. This paper proposes a novel image transmission scheme with low encoding complexity. The proposed scheme is based on quasi-cyclic low density parity check (QC-LDPC) codes with a simple recursive encoding form (SREF QC-LDPC code) which results in low encoding complexity and delay. Constructing the SREF QC-LDPC codes in this scheme composes of two main steps, construction of the base matrix and the exponent matrix. We combine the differential evolution and protograph extrinsic information transfer (PEXIT) method to optimize the base matrix of QC-LDPC code. Consequently, the exponent matrix and the parity check matrix are constructed. Simulation results show that the proposed scheme based on SREF QC-LDPC code can provide a good tradeoff between the performance and complexity.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 605 ◽  
Author(s):  
Federico Passerini ◽  
Andrea M. Tonello

Leakage of information in power line communication (PLC) networks is a threat to privacy and security. A way to enhance security is to encode the transmitted information with the use of a secret key. If the communication channel exhibits common characteristics at both ends and these are unknown to a potential eavesdropper, then it is possible to locally generate a common secret key at the two communication ends without the need for sharing it through the broadcast channel. This is known as physical layer key generation. To this aim, known techniques have been developed exploiting the transfer function of symmetric channels. However, the PLC channel is in general not symmetric, but just reciprocal. Therefore, in this paper, we first analyze the characteristics of the channel to verify whether physical layer key generation can be implemented. Then, we propose two novel methods that exploit the reciprocity of the PLC channel to generate common information by the two intended users. This information is processed through different quantization techniques to generate secret keys locally. To assess the security of the generated keys, we analyze the spatial correlation of PLC channels. This allows verifying whether the eavesdropper’s channels are weakly correlated with the intended users’ channel. Consequently, it is found that the information leaked to a possible eavesdropper has very low correlation to the locally generated key. The analysis and proposed methods are validated on a measurement dataset.


Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

AbstractAiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.


Sign in / Sign up

Export Citation Format

Share Document