-
Revisiting the Wireless Channel from Physical Layer Security Perspective
Authors:
Abuu. B. Kihero,
Haji. M. Furqan,
M. M. Sahin,
Huseyin Arslan
Abstract:
Security has emerged as one of the critical requirements in future wireless networks. Unlike traditional cryptography-based security, physical layer security (PLS) exploits various features of the random wireless channel to secure not only the information being communicated but the whole communication process from any type of attack. Future wireless networks are envisioned to feature new technolog…
▽ More
Security has emerged as one of the critical requirements in future wireless networks. Unlike traditional cryptography-based security, physical layer security (PLS) exploits various features of the random wireless channel to secure not only the information being communicated but the whole communication process from any type of attack. Future wireless networks are envisioned to feature new technologies such as re-configurable intelligent surfaces, massive multiple input multiple output, and sensing, to accommodate the emerging use-cases. Both, the new technologies and the new use-cases have been found to enrich the channel characteristics by unveiling some new channel features which can be readily exploited to facilitate PLS. This article surveys these new channel features to reveal their potential for PLS implementation. In the course of the article, the assessments of important qualities while selecting a certain channel feature for the PLS application are discussed. The importance of the channel control concept and sensing technologies that facilitate the accessibility of certain channel features are highlighted from the PLS perspective. Security attacks aimed at channel characteristics, rather than the communication itself, in order to disrupt PLS implementations are also discussed. Finally, the article summarizes the possible research direction for channel-based PLS.
△ Less
Submitted 2 June, 2022;
originally announced June 2022.
-
Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks
Authors:
Salah Eddine Zegrar,
Haji M. Furqan,
Huseyin Arslan
Abstract:
In this work, novel physical layer security (PLS) schemes are proposed for orthogonal frequency-division multiplexing (OFDM) to secure both data and pilots. The majority of previous studies focus on only securing the data without considering the security of the pilots used for channel estimation. However, the leakage of channel state information (CSI) from a legitimate node to an eavesdropper allo…
▽ More
In this work, novel physical layer security (PLS) schemes are proposed for orthogonal frequency-division multiplexing (OFDM) to secure both data and pilots. The majority of previous studies focus on only securing the data without considering the security of the pilots used for channel estimation. However, the leakage of channel state information (CSI) from a legitimate node to an eavesdropper allows the latter to acquire knowledge about the channel of the legitimate nodes. To this end, we propose adaptive and flexible PLS algorithms which can 1) secure data, 2) secure pilots, and 3) jointly secure both data and pilots. Particularly, minimum-phase all-pass channel decomposition is exploited, where the proposed algorithms use the all-pass component to provide security without harming the performance of the legitimate user. In the analysis for data security, we evaluated the secrecy under correlated and uncorrelated eavesdrop** channels via closed-form bit error rate (BER) formulas. For pilot security, we analyzed the normalized mean squared error (NMSE) performance of the estimated channel. The simulation results along with theoretical analysis demonstrate that the proposed algorithms can effectively enhance the communication secrecy of the overall system.
△ Less
Submitted 22 October, 2021;
originally announced October 2021.
-
Cyclic Prefix (CP) Jamming Against Eavesdrop** Relays in OFDM Systems
Authors:
Muhammad Sohaib J. Solaija,
Haji M. Furqan,
Zekeriyya Esat Ankaralı,
Hüseyin Arslan
Abstract:
Cooperative communication has been widely used to provide spatial diversity benefits for low-end user equipments, especially in ad hoc and wireless sensor networks. However, the lack of strong authentication mechanisms in these networks leaves them prone to eavesdrop** relays. In this paper, we propose a secure orthogonal frequency division multiplexing (OFDM) transmission scheme, where the dest…
▽ More
Cooperative communication has been widely used to provide spatial diversity benefits for low-end user equipments, especially in ad hoc and wireless sensor networks. However, the lack of strong authentication mechanisms in these networks leaves them prone to eavesdrop** relays. In this paper, we propose a secure orthogonal frequency division multiplexing (OFDM) transmission scheme, where the destination node transmits a jamming signal over the cyclic prefix (CP) duration of the received signal. Simulation results verify that as long as at least a part of the jamming signal falls to the actual data portion of the eavesdrop** relay, it spreads through all the data symbols due to the fast Fourier transformation (FFT) operation, resulting in degraded interception at the eavesdropper.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
Subcarrier Number and Indices-Based KeyGeneration for Future Wireless Networks
Authors:
Haji M. Furqan,
Jehad M. Hamamreh,
Huseyin Arslan
Abstract:
Physical layer key generation from the wireless channel is an emerging area of interest to provide confidentiality and authentication. One of the main challenges in this domain is to increase the length of the secret key while maintaining its randomness and uniformity. In this work, new dimensions for wireless channel-based key generation are proposed for orthogonal frequency division multiplexing…
▽ More
Physical layer key generation from the wireless channel is an emerging area of interest to provide confidentiality and authentication. One of the main challenges in this domain is to increase the length of the secret key while maintaining its randomness and uniformity. In this work, new dimensions for wireless channel-based key generation are proposed for orthogonal frequency division multiplexing (OFDM) systems. The novel perspective of the proposed work lies in the generation of key bits not only from the magnitudes of OFDM subchannels as it has conventionally been done but also from the number and positions of those subchannels whose channel gains are above the mean of the respective subblock. The effectiveness of the proposed algorithms is evaluated in terms of key generation rate and key mismatch rate. Additionally, a statistical test suite offered by the National Institute of Standards and Technology is used to evaluate the randomness of the generated key bits. It is shown in the simulation results that the involvement of the proposed dimensions can double the key generation rate compared to conventional algorithms.
△ Less
Submitted 30 September, 2021;
originally announced September 2021.
-
Generalized Radio Environment Monitoring for Next Generation Wireless Networks
Authors:
Halise Turkmen,
Muhammad Sohaib J. Solaija,
Haji M. Furqan,
Huseyin Arslan
Abstract:
Enabling technologies of 5G and beyond wireless communication networks, such as millimeter-wave communication, beamforming, and multiple-input multiple-output (MIMO) antenna systems, are becoming increasingly dependent on accurate information of the physical environment for optimized communication performance. The acquisition of this information is a significant challenge, which can be eased by kn…
▽ More
Enabling technologies of 5G and beyond wireless communication networks, such as millimeter-wave communication, beamforming, and multiple-input multiple-output (MIMO) antenna systems, are becoming increasingly dependent on accurate information of the physical environment for optimized communication performance. The acquisition of this information is a significant challenge, which can be eased by knowledge of the radio environment. Radio environment map** (REM) has long been considered an enabler of cognitive radios (CRs). However, the limitations of radios effectively confined the application of REM to spectrum sensing and interference map**. With the advent of more capable software-defined radios and advanced networks, the idea of a truly intelligent communication system empowered by enhanced REM can be realized. To this effect, we propose the generalized radio environment monitoring (G-REM) concept to include all aspects of the radio environment. We outline a general, self contained framework which enables radio environment monitoring in standalone devices. The presented G-REM framework comprises of different information sources, sensing methods, sensing modes, and map** techniques to enable the realization of more reliable, secure, efficient, and faster future wireless networks. The accompanying challenges and future research direction are also provided.
△ Less
Submitted 27 August, 2020; v1 submitted 14 August, 2020;
originally announced August 2020.
-
Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey
Authors:
Abdullateef Almohamad,
Anas M. Tahir,
Ayman Al-Kababji,
Haji M. Furqan,
Tamer Khattab,
Mazen O. Hasna,
Huseyin Arslan
Abstract:
With the emergence of the internet of things (IoT) technology, wireless connectivity should be more ubiquitous than ever. In fact, the availability of wireless connection everywhere comes with security threats that, unfortunately, cannot be handled by conventional cryptographic solutions alone, especially in heterogeneous and decentralized future wireless networks. In general, physical layer secur…
▽ More
With the emergence of the internet of things (IoT) technology, wireless connectivity should be more ubiquitous than ever. In fact, the availability of wireless connection everywhere comes with security threats that, unfortunately, cannot be handled by conventional cryptographic solutions alone, especially in heterogeneous and decentralized future wireless networks. In general, physical layer security (PLS) helps in bridging this gap by taking advantage of the fading propagation channel. Moreover, the adoption of reconfigurable intelligent surfaces (RIS) in wireless networks makes the PLS techniques more efficient by involving the channel into the design loop. In this paper, we conduct a comprehensive literature review on the RIS-assisted PLS for future wireless communications. We start by introducing the basic concepts of RISs and their different applications in wireless communication networks and the most common PLS performance metrics. Then, we focus on the review and classification of RIS-assisted PLS applications, exhibiting multiple scenarios, system models, objectives, and methodologies. In fact, most of the works in this field formulate an optimization problem to maximize the secrecy rate (SR) or secrecy capacity (SC) at a legitimate user by jointly optimizing the beamformer at the transmitter and the RIS's coefficients, while the differences are in the adopted methodology to optimally/sub-optimally approach the solution. We finalize this survey by presenting some insightful recommendations and suggesting open problems for future research extensions.
△ Less
Submitted 10 September, 2020; v1 submitted 25 June, 2020;
originally announced June 2020.
-
Primary User Emulation and Jamming Attack Detection in Cognitive Radio via Sparse Coding
Authors:
H. M. Furqan,
M. A. Aygul,
M. Nazzal,
H. Arslan
Abstract:
Cognitive radio is an intelligent and adaptive radio that improves the utilization of the spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user emulation and jamming attacks that degrade the spectrum utilization. In this paper, an algorithm for the detection of primary user emulation and jamming attacks in cognitive radio is proposed. The proposed algorithm is…
▽ More
Cognitive radio is an intelligent and adaptive radio that improves the utilization of the spectrum by its opportunistic sharing. However, it is inherently vulnerable to primary user emulation and jamming attacks that degrade the spectrum utilization. In this paper, an algorithm for the detection of primary user emulation and jamming attacks in cognitive radio is proposed. The proposed algorithm is based on the sparse coding of the compressed received signal over a channel-dependent dictionary. More specifically, the convergence patterns in sparse coding according to such a dictionary are used to distinguish between a spectrum hole, a legitimate primary user, and an emulator or a jammer. The process of decision-making is carried out as a machine learning-based classification operation. Extensive numerical experiments show the effectiveness of the proposed algorithm in detecting the aforementioned attacks with high success rates. This is validated in terms of the confusion matrix quality metric. Besides, the proposed algorithm is shown to be superior to energy detection-based machine learning techniques in terms of receiver operating characteristics curves and the areas under these curves
△ Less
Submitted 16 June, 2020;
originally announced June 2020.
-
Intelligent Physical Layer Security Approach for V2X Communication
Authors:
Haji M. Furqan,
Muhammad Sohaib J. Solaija,
Jehad M. Hamamreh,
Huseyin Arslan
Abstract:
Intelligent transportation systems (ITS) with advanced sensing and computing technologies are expected to support a whole new set of services including pedestrian and vehicular safety, internet access for vehicles, and eventually, driverless cars. Wireless communication is a major driving factor behind ITS, enabling reliable communication between vehicles, infrastructure, pedestrians and network,…
▽ More
Intelligent transportation systems (ITS) with advanced sensing and computing technologies are expected to support a whole new set of services including pedestrian and vehicular safety, internet access for vehicles, and eventually, driverless cars. Wireless communication is a major driving factor behind ITS, enabling reliable communication between vehicles, infrastructure, pedestrians and network, generally referred to as vehicle to everything (V2X) communication. However, the broadcast nature of wireless communication renders it prone to jamming, eavesdrop** and spoofing attacks which can adversely affect ITS. Kee** in view this issue, we suggest the use of an intelligent security framework for V2X communication security, referred to as intelligent V2X security (IV2XS), to provide a reliable and robust solution capable of adapting to different conditions, scenarios and user requirements. We also identify the conditions that impact the security and describe the open challenges in achieving a realistic IV2XS system.
△ Less
Submitted 8 August, 2020; v1 submitted 13 May, 2019;
originally announced May 2019.
-
Physical Layer Security for NOMA: Requirements, Merits, Challenges, and Recommendations
Authors:
Haji M. Furqan,
Jehad. M. Hamamreh,
Huseyin Arslan
Abstract:
Non-Orthogonal Multiple Access (NOMA) has been recognized as one of the most significant enabling technologies for future wireless systems due to its eminent spectral efficiency, ability to provide an additional degree of freedom for Ultra Reliable Low Latency Communications (URLLC) and grant free random access. Meanwhile, Physical Layer Security (PLS) has got much attention for future wireless co…
▽ More
Non-Orthogonal Multiple Access (NOMA) has been recognized as one of the most significant enabling technologies for future wireless systems due to its eminent spectral efficiency, ability to provide an additional degree of freedom for Ultra Reliable Low Latency Communications (URLLC) and grant free random access. Meanwhile, Physical Layer Security (PLS) has got much attention for future wireless communication systems due to its capability to provide security without relying on traditional cryptography based algorithms. In this article, security design requirements for NOMA and solutions provided by PLS to fulfill these requirements are discussed. The merits and challenges arising from employing PLS to NOMA are identified. Finally, future recommendations and prospective solutions are also presented.
△ Less
Submitted 13 July, 2020; v1 submitted 13 May, 2019;
originally announced May 2019.