-
Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments
Authors:
Vahid Shahiri,
Hamid Behroozi,
Ali Kuhestani
Abstract:
Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means t…
▽ More
Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means to induce randomness in static wireless channels has received significant research interest. However, the impact of spatial correlation between the IRS elements is rarely studied. To be specific, for the first time, in this contribution, we take into account a spatially correlated IRS which intends to enhance the secret key generation (SKG) rate in a static medium. Closed form analytical expressions for SKG rate are derived for the two cases of random phase shift and equal random phase shift for all the IRS elements. We also analyze the temporal correlation between the channel samples to ensure the randomness of the generated secret key sequence. We further formulate an optimization problem in which we determine the optimal portion of time within a coherence interval dedicated for the direct and indirect channel estimation. We show the accuracy and the fast convergence of our proposed sequential convex programming (SCP) based algorithm and discuss the various parameters affecting spatially correlated IRS assisted PLKG.
△ Less
Submitted 3 December, 2022;
originally announced December 2022.
-
Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Ali Kuhestani,
Phee Lep Yeoh
Abstract:
In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. S…
▽ More
In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. Specifically, Bob requires secure communications such that his messages from Alice are not decoded by the untrusted user, while Carol requires covert communications such that her messages from Alice are not detected by the warden.
To do so, we consider that Alice transmits Carol's messages during selected time slots to hide them from the warden while also transmitting Bob's messages in each time slot contentiously.
We formulate an optimization problem with the aim of maximizing the average rate subject to a covert communication requirement and a secure communications constraint.
Since the proposed optimization problem is non-convex, we utilize successive convex approximation to obtain a tractable solution. We consider practical assumptions that Alice has imperfect knowledge of the warden's location and imperfect channel state information (CSI) of Bob and Carol.
Our numerical examples highlight that the imperfect CSI at Carol has a more detrimental impact on the average rate compared to imperfect CSI at Bob.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?
Authors:
Milad Tatar Mamaghani,
Ali Kuhestani,
Hamid Behroozi
Abstract:
Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relayin…
▽ More
Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multiple untrusted relays. In our proposed secure transmission scheme, all the legitimate nodes contribute to providing secure communication by intelligently injecting artificial noises to the network in different communication phases. For the sake of analysis, we consider a multi-hop untrusted relaying network with two successive intermediate nodes, i.e, a three-hop communications network. Given this system model, a new closed-form expression is presented in the high signal-to-noise ratio (SNR) region for the Ergodic secrecy rate (ESR). Furthermore, we evaluate the high SNR slope and power offset of the ESR to gain an insightful comparison of the proposed secure transmission scheme and the state-of-arts. Our numerical results highlight that the proposed secure transmission scheme provides better secrecy rate performance compared with the two-hop untrusted relaying as well as the direct transmission schemes.
△ Less
Submitted 5 July, 2020; v1 submitted 17 May, 2019;
originally announced May 2019.
-
Covert Transmission with Antenna Selection and Using an External Jammer
Authors:
Morteza Sarkheil,
Paeiz Azmi,
Moslem Forouzesh,
Ali Kuhestani
Abstract:
This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the j…
▽ More
This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the jammer transmits an artificial noise signal. For this system model, we consider a scenario where the source is forced to select one or several of its antennas to transmit its confidential information due to its limited RF chains. Furthermore, we consider two different jamming scenarios to support our covert communication: 1) The destination is unable to cancel the jamming signal, 2) The destination can subtract the jamming signal. For such a communication network, our aim is to maximize the covert rate subject to power constraint and covert communication requirement. In the first scenario, the optimization problem is non-convex, and hence, it can be solved through using Difference of Convex function (DC) method while the optimization problem of the second scenario is intrinsically convex. Our numerical results show that the higher the number of selected antennas at the transmitter, the higher the covert rate will be achieved.
△ Less
Submitted 26 December, 2018;
originally announced December 2018.
-
Secure transmission with covert requirement in untrusted relaying networks
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Ali Kuhestani
Abstract:
In this paper, we study the problem of secure transmission with covert requirement in untrusted relaying networks. Our considered system model consists of one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current…
▽ More
In this paper, we study the problem of secure transmission with covert requirement in untrusted relaying networks. Our considered system model consists of one source, one destination, one untrusted relay, and one Willie. The untrusted relay tries to extract the information signal, while the goal of Willie is to detect the presence of the information signal transmitted by the source, in the current time slot. To overcome these two attacks, we illustrate that the destination and the source should inject jamming signal to the network in phase I and phase II, respectively. Accordingly, the communication in our proposed system model is accomplished in two phases. In the first phase, when the source transmits its data to the untrusted relay the destination broadcasts its jamming signal. In the second phase, when the relay retransmits the received signal, the source transmits a jamming signal with one of its antennas. For this system model, we propose a power allocation strategy to maximize the instantaneous secrecy rate subject to satisfying the covert requirements in both of the phases. Since the proposed optimization problem is non-convex, we adopt the Successive Convex Approximation (SCA) approach to convert it to a convex optimization problem. Next, we extend our system model to a practical system model where there are multiple untrusted relays and multiple Willies under two scenarios of noncolluding Willies and colluding Willies. Our findings highlight that unlike the direct transmission scheme, the achievable secrecy rate of the proposed secure transmission scheme improve as the number of untrusted relays increases.
△ Less
Submitted 2 September, 2018;
originally announced September 2018.
-
Joint Relay Selection and Power Allocation in Large-Scale MIMO Systems with Untrusted Relays and Passive Eavesdroppers
Authors:
Ali Kuhestani,
Abbas Mohammadi,
Mohammadali Mohammadi
Abstract:
In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance the physical layer security of a cooperative network, where a multiple antennas source communicates with a single-antenna destination in presence of untrusted relays and passive eavesdroppers (Eves). The objective is to protect the data confidentially while concurrently relying on the untrusted relays a…
▽ More
In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance the physical layer security of a cooperative network, where a multiple antennas source communicates with a single-antenna destination in presence of untrusted relays and passive eavesdroppers (Eves). The objective is to protect the data confidentially while concurrently relying on the untrusted relays as potential Eves to improve both the security and reliability of the network. To realize this objective, we consider cooperative jamming performed by the destination while JRP scheme is implemented. With the aim of maximizing the instantaneous secrecy rate, we derive a new closed-form solution for the optimal power allocation and propose a simple relay selection criterion under two scenarios of non-colluding Eves (NCE) and colluding Eves (CE). For the proposed scheme, a new closed-form expression is derived for the ergodic secrecy rate (ESR) and the secrecy outage probability as security metrics, and a new closed-form expression is presented for the average symbol error rate (SER) as a reliability measure over Rayleigh fading channels. We further explicitly characterize the high signal-to-noise ratio slope and power offset of the ESR to highlight the impacts of system parameters on the ESR. In addition, we examine the diversity order of the proposed scheme to reveal the achievable secrecy performance advantage. Finally, the secrecy and reliability diversity-multiplexing tradeoff of the optimized network are provided. Numerical results highlight that the ESR performance of the proposed JRP scheme for NCE and CE cases is increased with respect to the number of untrustworthy relays.
△ Less
Submitted 5 September, 2017;
originally announced September 2017.
-
Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
Authors:
Ali Kuhestani,
Abbas Mohammadi,
Kai-Kit Wong,
Phee Lep Yeoh,
Majid Moradikia,
Muhammad Ruhul Amin Khandaker
Abstract:
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA)…
▽ More
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an untrusted amplify-and-forward (AF) relay. We assume that either the source or the destination is equipped with a large-scale multiple antennas (LSMA) system, while the rest are equipped with a single antenna. To prevent the untrusted relay from intercepting the source message, the destination sends an intended jamming noise to the relay, which is referred to as destination-based cooperative jamming (DBCJ). Given this system model, novel closed-form expressions are presented in the high signal-to-noise ratio (SNR) regime for the ergodic secrecy rate (ESR) and the secrecy outage probability (SOP). We further improve the secrecy performance of the system by optimizing the associated hardware design. The results reveal that by beneficially distributing the tolerable hardware imperfections across the transmission and reception radio-frequency (RF) front ends of each node, the system's secrecy rate may be improved. The engineering insight is that equally sharing the total imperfections at the relay between the transmitter and the receiver provides the best secrecy performance. Numerical results illustrate that the proposed OPA together with the most appropriate hardware design significantly increases the secrecy rate.
△ Less
Submitted 5 September, 2017;
originally announced September 2017.
-
Optimal Power Allocation and Secrecy Sum Rate in Two-Way Untrusted Relaying
Authors:
Ali Kuhestani,
Phee Lep Yeoh,
Abbas Mohammadi
Abstract:
In this paper, we examine the secrecy performance of two-way relaying between a multiple antenna base station (BS) and a single antenna mobile user (MU) in the presence of a multiple antenna friendly jammer (FJ). We consider the untrusted relaying scenario where an amplify-and-forward relay is both a necessary helper and a potential eavesdropper. To maximize the instantaneous secrecy sum rate, we…
▽ More
In this paper, we examine the secrecy performance of two-way relaying between a multiple antenna base station (BS) and a single antenna mobile user (MU) in the presence of a multiple antenna friendly jammer (FJ). We consider the untrusted relaying scenario where an amplify-and-forward relay is both a necessary helper and a potential eavesdropper. To maximize the instantaneous secrecy sum rate, we derive new closed-form solutions for the optimal power allocation (OPA) between the BS and MU under the scenario of relaying with friendly jamming (WFJ). Based on the OPA solution, new closed-form expressions are derived for the ergodic secrecy sum rate (ESSR) with Rayleigh fading channel. Furthermore, we explicitly determine the high signal-to-noise ratio slope and power offset of the ESSR to highlight the benefits of friendly jamming. Numerical examples are provided to demonstrate the impact of the FJ's location and number of antennas on the secrecy performance.
△ Less
Submitted 5 September, 2017;
originally announced September 2017.
-
Secure two-way communication via a wireless powered untrusted relay and friendly jammer
Authors:
Milad Tatar Mamaghani,
Abbas Mohammadi,
Phee Lep Yeoh,
Ali Kuhestani
Abstract:
In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ). By adopting the time switching (TS) architecture at the relay, the data transmission is accomplished in three phases: Phase I) Energy harvesting by the untrusted relay and the FJ through no…
▽ More
In this paper, we propose a self-dependent two-way secure communication where two sources exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay and friendly jammer (FJ). By adopting the time switching (TS) architecture at the relay, the data transmission is accomplished in three phases: Phase I) Energy harvesting by the untrusted relay and the FJ through non-information transmissions from the sources, Phase II) Information transmission by the sources and jamming transmissions from the FJ to reduce information leakage to the untrusted relay; and Phase III) Forwarding the scaled version of the received signal from the untrusted relay to the sources. For the proposed system, we derive a new closed-form lower bound expression for the ergodic secrecy sum rate (ESSR). Numerical examples are provided to demonstrate the impacts of different system parameters such as energy harvesting time, transmit signal-to-noise ratio (SNR) and the relay/FJ location on the secrecy performance. The numerical results illustrate that the proposed network with friendly jamming (WFJ) outperforms traditional one-way communication and the two-way without friendly jamming (WoFJ) policy.
△ Less
Submitted 22 October, 2017; v1 submitted 22 August, 2017;
originally announced August 2017.
-
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
Authors:
Milad Tatar Mamaghani,
Ali Kuhestani,
Kai-Kit Wong
Abstract:
In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is do…
▽ More
In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is done in three phases. In the first phase, both the energy-starved nodes, the untrustworthy relay and the jammer, are charged by non-information radio frequency (RF) signals from the sources. In the second phase, the two sources send their information signals and concurrently, the jammer transmits artificial noise to confuse the curious relay. Finally, the third phase is dedicated to forward a scaled version of the received signal from the relay to the sources. For the proposed secure transmission schemes, we derive new closed-form lower-bound expressions for the ergodic secrecy sum rate (ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the asymptotic ESSR to determine the key parameters; the high SNR slope and the high SNR power offset of the jamming based scenarios. To highlight the performance advantage of the proposed FJ, we also examine the scenario of without jamming (WoJ). Finally, numerical examples and discussions are provided to acquire some engineering insights, and to demonstrate the impacts of different system parameters on the secrecy performance of the considered communication scenarios. The numerical results illustrate that the proposed FJ significantly outperforms the traditional one-way communication and the Constellation rotation approach, as well as our proposed benchmarks, the two-way WoJ and GNJ scenarios.
△ Less
Submitted 1 March, 2018; v1 submitted 21 August, 2017;
originally announced August 2017.