Biblio
Filters: Keyword is composability [Clear All Filters]
Enhancing Physical Layer Security with Coordinated Multi-Point Transmission in 5G and Beyond Networks. 2020 28th Signal Processing and Communications Applications Conference (SIU). :1–4.
.
2020. Physical layer security has gained importance with the widespread use of wireless communication systems. Multiantenna systems and multi-point transmission techniques in 5G and beyond are promising techniques not only for enhancing data rates, but also physical layer security. Coordinated multipoint transmission is used for enhancing the service quality and decreasing inter-cell interference especially for cell-edge users. In this study, analysis of physical layer security enhancement via multi-antenna technologies and coordinated multi-point for 5G and beyond networks is provided. The proposed scheme is evaluated on calculations from real-life mobile network topologies. As a figure of performance, the secure and successful detection probability is computed with varying antenna array size, number of coordinated transmission points, and different service requirements.
Physical Layer Security Analysis of Cooperative Mobile Communication Systems with Eavesdropper Employing MRC. 2020 28th Signal Processing and Communications Applications Conference (SIU). :1–4.
.
2020. In this paper, physical layer security (PLS) analysis of a cooperative wireless communication system in which the source and destination nodes communicate via a relay employing decode-and-forward protocol is performed for double Rayleigh fading channel model. For the system where the source, relay and target have single antenna, an eavesdropper with multiantenna listens the source and relay together by using maximum-ratio-combining, secrecy outage and positive secrecy capacity possibilities are obtained in closed-form. The theoretical results are verified by Monte-Carlo simulations. From the results, it is observed that as the number of antennas of the eavesdropper is increased, the PLS performance of the system worsens.
Secrecy Performance Analysis in Internet of Satellites: Physical Layer Security Perspective. 2020 IEEE/CIC International Conference on Communications in China (ICCC). :1185–1189.
.
2020. As the latest evolving architecture of space networks, Internet of Satellites (IoSat) is regarded as a promising paradigm in the future beyond 5G and 6G wireless systems. However, due to the extremely large number of satellites and open links, it is challenging to ensure communication security in IoSat, especially for wiretap resisting. To the best of our knowledge, it is an entirely new problem to study the security issue in IoSat, since existing works concerning physical layer security (PLS) in satellite networks mainly focused on the space-to-terrestrial links. It is also noted that, we are the first to investigate PLS problem in IoSat. In light of this, we present in this paper an analytical model of PLS in IoSat where a terrestrial transmitter delivers its information to multi-satellite in the presence of eavesdroppers. By adopting the key parameters such as satellites' deployment density, minimum elevation angle, and orbit height, two major secrecy metric including average secrecy capacity and probability are derived and analyzed. As demonstrated by extensive numerical results, the presented theoretical framework can be utilized to efficiently evaluate the secrecy performance of IoSat, and guide the design and optimization for communication security in such systems.
Security Enhancing and Probability Shaping Coordinated Optimization for CAP-PON in Physical Layer. 2020 Asia Communications and Photonics Conference (ACP) and International Conference on Information Photonics and Optical Communications (IPOC). :1–3.
.
2020. A secure-enhanced scheme based on deoxyribonucleic acid (DNA) encoding encryption and probabilistic shaping (PS) is proposed. Experimental results verify the superiority of our proposed scheme in the achievement of security and power gain. © 2020 The Author(s).
Realizing Physical Layer Security in Large Wireless Networks using Spectrum Programmability. 2020 IEEE Globecom Workshops (GC Wkshps. :1–6.
.
2020. This paper explores a practical approach to securing large wireless networks by applying Physical Layer Security (PLS). To date, PLS has mostly been seen as an information theory concept with few practical implementations. We present an Access Point (AP) selection algorithm that uses PLS to find an AP that offers the highest secrecy capacity to a legitimate user. We then propose an implementation of this algorithm using the novel concept of spectrum programming which extends Software-Defined Networking to the physical and data-link layers and makes wireless network management and control more flexible and scalable than traditional platforms. Our Wi-Fi network evaluation results show that our approach outperforms conventional solutions in terms of security, but at the expense of communication capacity, thus identifying a trade-off between security and performance. These results encourage implementation and extension to further wireless technologies.
Cooperative MIMO for Adaptive Physical Layer Security in WBAN. ICC 2020 - 2020 IEEE International Conference on Communications (ICC). :1–7.
.
2020. Internet of Things (IoT) is becoming an emerging paradigm to provide pervasive connectivity where “anything“ can be connected “anywhere” at “anytime” via massive deployment of physical objects like sensors, controllers, and actuators. However, the open nature of wireless communications and the energy constraint of the IoT devices impose strong security concerns. In this context, traditional cryptographic techniques may not be suitable in such a resource-constrained network. To address this problem, an effective security solution that ensures a trade-off between security effectiveness and energy efficiency is required. In this paper, we exploit cooperative transmission between sensor nodes in IoT for e-Health application, as a promising technique to enhance the physical layer security of wireless communications in terms of secrecy capacity while considering the resource-impoverished devices. Specifically, we propose a dynamic and cooperative virtual multiple-input and multiple-output (MIMO) configuration approach based on game theory to preserve the confidentiality of the transmitted messages with high energy savings. For this purpose, we model the physical layer security cooperation problem as a non-transferable coalition formation game. The set of cooperative devices form a virtual dynamically-configured MIMO network that is able to securely and efficiently transmit data to the destination. Simulation results show that the proposed game-based virtual MIMO configuration approach can improve the average secrecy capacity per device as well as the network lifetime compared to non-cooperative transmission.
Root Cause Analysis for Autonomous Optical Networks: A Physical Layer Security Use Case. 2020 European Conference on Optical Communications (ECOC). :1–4.
.
2020. To support secure and reliable operation of optical networks, we propose a framework for autonomous anomaly detection, root cause analysis and visualization of the anomaly impact on optical signal parameters. Verification on experimental physical layer security data reveals important properties of different attack profiles.
Keep Private Networks Private: Secure Channel-PUFs, and Physical Layer Security by Linear Regression Enhanced Channel Profiles. 2020 3rd International Conference on Data Intelligence and Security (ICDIS). :93–100.
.
2020. In the context of a rapidly changing and increasingly complex (industrial) production landscape, securing the (communication) infrastructure is becoming an ever more important but also more challenging task - accompanied by the application of radio communication. A worthwhile and promising approach to overcome the arising attack vectors, and to keep private networks private, are Physical Layer Security (PhySec) implementations. The paper focuses on the transfer of the IEEE802.11 (WLAN) PhySec - Secret Key Generation (SKG) algorithms to Next Generation Mobile Networks (NGMNs), as they are the driving forces and key enabler of future industrial networks. Based on a real world Long Term Evolution (LTE) testbed, improvements of the SKG algorithms are validated. The paper presents and evaluates significant improvements in the establishment of channel profiles, whereby especially the Bit Disagreement Rate (BDR) can be improved substantially. The combination of the Discrete Cosine Transformation (DCT) and the supervised Machine Learning (ML) algorithm - Linear Regression (LR) - provides outstanding results, which can be used beyond the SKG application. The evaluation also emphasizes the appropriateness of PhySec for securing private networks.
Strategy of Relay Selection and Cooperative Jammer Beamforming in Physical Layer Security. 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall). :1–6.
.
2020. In this paper, a novel strategy of relay selection and cooperative jammer beamforming is proposed. The proposed scheme selects one node from the intermediate nodes as relay and the rest nodes as friendly jammers. The relay operates in amplify-and-forward (AF) strategy. Jammer weights are derived to null the jamming signals at the destination and relay node and maximize the jamming signal at the eavesdropper. Furthermore, a closed-form optimal solution of power allocation between the selected relay and cooperative jammers is derived. Numerical simulation results show that the proposed scheme can outperform the conventional schemes at the same power consumption.
Improving Physical Layer Security Technique Based on 4-D Antenna Arrays with Pre-Modulation. 2020 14th European Conference on Antennas and Propagation (EuCAP). :1–3.
.
2020. Four-dimensional (4-D) antenna arrays formed by introducing time as the forth controlling variable are able to be used to regulate the radiation fields in space, time and frequency domains. Thus, 4-D antenna arrays are actually the excellent platform for achieving physical layer secure transmission. However, traditional direction modulation technique of 4-D antenna arrays always inevitably leads to higher sidelobe level of radiation pattern or less randomness. Regarding to the problem, this paper proposed a physical layer secure transmission technique based on 4-D antenna arrays, which combine the advantages of traditional phased arrays, and 4-D arrays for improving the physical layer security in wireless networks. This technique is able to reduce the radiated power at sidelobe region by optimizing the time sequences. Moreover, the signal distortion caused by time modulation can be compensated in the desired direction by pre-modulating transmitted signals.
Model-Based Quality Consistency Analysis of Permanent Magnet Synchronous Motor Cogging Torque in Wide Temperature Range. 2021 3rd International Conference on System Reliability and Safety Engineering (SRSE). :131–138.
.
2021. Permanent magnet synchronous motors (PMSM) are widely used in the shafts of industrial robots. The quality consistency of PMSM, derived from both the wide range of operating temperature and inherent uncertainties, significantly influences the application of the PMSM. In this paper, the mechanism of temperature influence on the PMSM is analyzed with the aid of the digital model, and the quantitative relationship between the main PMSM feature, the cogging torque, and the temperature is revealed. Then, the NdFeB remanence in different temperature levels was measured to obtain its temperature coefficient. The finite element method is used to simulate PMSM. The qualitative and quantitative conclusions of cogging torque drop when the temperature rises are verified by experiments. The magnetic performance data of the magnetic tiles of 50 motors were randomly sampled and the cogging torque simulation was carried out under the fixed ambient temperature. The results show that the dispersion significantly increases the stray harmonic components of the cogging torque.
Hysteresis Effect Induces the Inductor Power Loss of Converter during the Voltage Conversion. 2021 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA). :1–7.
.
2021. A new methodology to calculate the hysteresis induced power loss of inductor from the measured waveforms of DC-to-DC converter during the voltage conversion is presented. From this study, we find that the duty cycles (D) of the buck and boost converters used till date for inductance current calculation are not exactly equal to VOUT/VIN and 1-VIN/VOUT as the inductance change induced by the hysteresis effect cannot be neglected. Although the increase in the loading currents of the converter increases the remanence magnetization of inductor at the turn-off time (toff), this remanence magnetization is destroyed by the turbulence induced vortex current at the transistor turn-on transient. So, the core power loss of inductor increases with the loading current of the converter and becomes much larger than other power losses and cannot be neglected for the power efficiency calculation during power stage design.
Validation of the standstill magnetization strategy of a FeCrCo-based Variable Flux Memory Machine. 2021 24th International Conference on Electrical Machines and Systems (ICEMS). :536–541.
.
2021. The use of AlNiCo alloys as the low coercive force (LCF) magnet in Variable Flux Memory Machines has been largely discussed in the literature, but similar magnetic materials as FeCrCo are still little explored. This paper proposes the study of a standstill magnetization strategy of a Variable Flux Memory Machine composed by a FeCrCo-based cylindrical rotor. An inverter in DC/DC mode is proposed for injecting short-time currents along the magnetization axis aiming the regulation of the magnetization state of the FeCrCo. A methodology for validating results obtained is defined from the estimation of the remanence and the excitation field characterizing the behavior of the internal recoil lines of the magnet used in the rotor. A study of the armature reaction affecting the machine when q-axis currents supply the machine is proposed by simulation.
Exciter Remanence Effect Mitigation in a Brushless Synchronous Generator for Test-field Applications. IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society. :1–6.
.
2021. Brushless synchronous generators (BSG) are typically used to produce an island network whose voltage is close to the nominal voltage of the generator. Generators are often used also in test-field applications where also zero output voltage is needed. The exciter construction and magnetic remanence may lead to a situation where the non-loaded generator terminal voltage cannot be controlled close to zero but a significant voltage is always generated because the exciter remanence. A new brushless synchronous generator excitation and de-excitation converter topology for test applications is proposed. The purpose is to achieve full voltage control from zero to nominal level without modifications to the generator. Insulated-gate bipolar transistor (IGBT) and Field-Programmable Gate Array (FPGA) technology are used to achieve the required fast and accurate control. In the work, simulation models were first derived to characterize the control performance. The proposed converter topology was then verified with the simulation model and tested empirically with a 400 kVA brushless synchronous generator. The results indicate that the exciter remanence and self-excitation can be controlled through the exciter stationary field winding when the proposed converter topology controls the field winding current. Consequently, in highly dynamical situations, the system is unaffected by mechanical stresses and wear in the generator.
FPTSA-SLP: A Fake Packet Time Slot Assignment-based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks. 2021 Computing, Communications and IoT Applications (ComComAp). :307–311.
.
2021. Nowadays, source location privacy in underwater acoustic sensor networks (UASNs) has gained a lot of attention. The aim of source location privacy is to use specific technologies to protect the location of the source from being compromised. Among the many technologies available are fake packet technology, multi-path routing technology and so on. The fake packet technology uses a certain amount of fake packets to mask the transmission of the source packet, affecting the adversary's efficiency of hop-by-hop backtracking to the source. However, during the operation of the fake packet technology, the fake packet, and the source packet may interfere with each other. Focus on this, a fake packet time slot assignment-based source location privacy protection (FPTSA-SLP) scheme. The time slot assignment is adopted to avoid interference with the source packet. Also, a relay node selection method based on the handshake is further proposed to increase the diversity of the routing path to confuse the adversary. Compared with the comparison algorithm, the simulation results demonstrate that the proposed scheme has a better performance in safety time.
Privacy Preserved Secure Offloading in the Multi-access Edge Computing Network. 2021 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). :1–6.
.
2021. Mobile edge computing (MEC) emerges recently to help process the computation-intensive and delay-sensitive applications of resource limited mobile devices in support of MEC servers. Due to the wireless offloading, MEC faces many security challenges, like eavesdropping and privacy leakage. The anti-eavesdropping offloading or privacy preserving offloading have been studied in existing researches. However, both eavesdropping and privacy leakage may happen in the meantime in practice. In this paper, we propose a privacy preserved secure offloading scheme aiming to minimize the energy consumption, where the location privacy, usage pattern privacy and secure transmission against the eavesdropper are jointly considered. We formulate this problem as a constrained Markov decision process (CMDP) with the constraints of secure offloading rate and pre-specified privacy level, and solve it with reinforcement learning (RL). It can be concluded from the simulation that this scheme can save the energy consumption as well as improve the privacy level and security of the mobile device compared with the benchmark scheme.
A robust fixed path-based routing scheme for protecting the source location privacy in WSNs. 2021 17th International Conference on Mobility, Sensing and Networking (MSN). :48–55.
.
2021. With the development of wireless sensor networks (WSNs), WSNs have been widely used in various fields such as animal habitat detection, military surveillance, etc. This paper focuses on protecting the source location privacy (SLP) in WSNs. Existing algorithms perform poorly in non-uniform networks which are common in reality. In order to address the performance degradation problem of existing algorithms in non-uniform networks, this paper proposes a robust fixed path-based random routing scheme (RFRR), which guarantees the path diversity with certainty in non-uniform networks. In RFRR, the data packets are sent by selecting a routing path that is highly differentiated from each other, which effectively protects SLP and resists the backtracking attack. The experimental results show that RFRR increases the difficulty of the backtracking attack while safekeeping the balance between security and energy consumption.
Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks. 2021 International Conference on Information Networking (ICOIN). :792–797.
.
2021. It is important to ensure source location privacy (SLP) protection in safety-critical monitoring applications. Also, to achieve effective long-term monitoring, it is essential to design SLP protocols with high energy efficiency and energy balancing. Therefore, this study proposes a new phantom with angle (PwA) protocol. The PwA protocol employs dynamic routing paths which are designed to achieve SLP protection with energy efficiency and energy balancing. Analysis results reveal that the PwA protocol exhibits superior performance features to outperform existing protocols by achieving high levels of SLP protection for time petime periods. The results confirm that the PwA protocol is practical in long-term monitoring systems.riods. The results confirm that the PwA protocol is practical in long-term monitoring systems.
Virtual Private Mobile Network with Multiple Gateways for B5G Location Privacy. 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall). :1–6.
.
2021. In a beyond-5G (B5G) scenario, we consider a virtual private mobile network (VPMN), i.e., a set of user equipments (UEs) directly communicating in a device-to-device (D2D) fashion, and connected to the cellular network by multiple gateways. The purpose of the VPMN is to hide the position of the VPMN UEs to the mobile network operator (MNO). We investigate the design and performance of packet routing inside the VPMN. First, we note that the routing that maximizes the rate between the VPMN and the cellular network leads to an unbalanced use of the gateways by each UE. In turn, this reveals information on the location of the VPMN UEs. Therefore, we derive a routing algorithm that maximizes the VPMN rate, while imposing for each UE the same data rate at each gateway, thus hiding the location of the UE. We compare the performance of the resulting solution, assessing the location privacy achieved by the VPMN, and considering both the case of single hop and multihop in the transmissions from the UEs to the gateways.
Enhancing Source-Location Privacy in IoT Wireless Sensor Networks Routing. 2021 IEEE 4th International Conference on Computer and Communication Engineering Technology (CCET). :376–381.
.
2021. Wireless Sensor Networks (WSNs) and their implementations have been the subject of numerous studies over the last two decades. WSN gathers, processes, and distributes wireless data to the database storage center. This study aims to explain the four main components of sensor nodes and the mechanism of WSN's. WSNs have 5 available types that will be discussed and explained in this paper. In addition to that, shortest path routing will be thoroughly analyzed. In “The Protocol”. Reconfigurable logic applications have grown in number and complexity. Shortest path routing is a method of finding paths through a network with the least distance or other cost metric. The efficiency of the shortest path protocol mechanism and the reliability of encryption are both present which adds security and accuracy of location privacy and message delivery. There are different forms of key management, such as symmetric and asymmetric encryption, each with its own set of processing techniques. The use of encryption technique to secure sensor nodes is addressed, as well as how we overcame the problem with the aid of advanced techniques. Our major findings are that adding more security doesn't cost much and by cost we mean energy consumption, throughput and latency.
Location Based Privacy Protection Data Interference Method. 2021 International Conference on Electronic Information Technology and Smart Agriculture (ICEITSA). :89–93.
.
2021. In recent years, with the rise of the Internet of things industry, a variety of user location-based applications came into being. While users enjoy these convenient services, their location information privacy is also facing a great threat. Therefore, the research on location privacy protection in the Internet of things has become a hot spot for scholars. Privacy protection microdata publishing is a hot spot in data privacy protection research. Data interference is an effective solution for privacy protection microdata publishing. Aiming at privacy protection clustering problem, a privacy protection data interference method is proposed. In this paper, the location privacy protection algorithm is studied, with the purpose of providing location services and protecting the data interference of users' location privacy. In this paper, the source location privacy protection protocol (PR \_ CECRP) algorithm with controllable energy consumption is proposed to control the energy consumption of phantom routing strategy. In the routing process from the source node to the phantom node, the source data packet forwarding mechanism based on sector area division is adopted, so that the random routing path is generated and the routing energy consumption and transmission delay are effectively controlled.
Privacy-Preserving Proximity Detection Framework for Location-Based Services. 2021 International Conference on Networking and Network Applications (NaNA). :99–106.
.
2021. With the popularization of mobile communication and sensing equipment, as well as the rapid development of location-aware technology and wireless communication technology, LBSs(Location-based services) bring convenience to people’s lives and enable people to arrange activities more efficiently and reasonably. It can provide more flexible LBS proximity detection query, which has attracted widespread attention in recent years. However, the development of proximity detection query still faces many severe challenges including query information privacy. For example, when users want to ensure their location privacy and data security, they can get more secure location-based services. In this article, we propose an efficient and privacy-protecting proximity detection framework based on location services: PD(Proximity Detection). Through PD, users can query the range of arbitrary polygons and obtain accurate LBS results. Specifically, based on homomorphic encryption technology, an efficient PRQ(polygon range query) algorithm is constructed. With the help of PRQ, PD, you can obtain accurate polygon range query results through the encryption request and the services provided by the LAS(LBS Agent Server) and the CS(Cloud Server). In addition, the query privacy of the queryer and the information of the data provider are protected. The correctness proof and performance analysis show that the scheme is safe and feasible. Therefore, our scheme is suitable for many practical applications.
The Impact of Energy-Inefficient Communications on Location Privacy Protection in Monitoring Wireless Networks. 2021 Twelfth International Conference on Ubiquitous and Future Networks (ICUFN). :289–294.
.
2021. Wireless sensor networks (WSNs) have gained increasing popularity in ubiquitous support of sensing system services. Often, WSNs are energy-constrained and they are deployed in harsh and unattended environments. Consequently, WSNs are vulnerable to energy and environmental factors. To ensure secure and reliable operations in safety-critical monitoring WSNs, it is important to guarantee energy-efficient communications, location privacy protection, and reliability. Fake packet-based source location privacy (SLP) protocols are known to be energy-inefficient. Therefore, in this study, we investigate the impact of energy-inefficient communications on the privacy performance of the fake packet-based SLP protocols. Experiment results show that the protocols achieve short-term and less reliable SLP protection.
Privacy-Aware Ant Routing for Wireless Multimedia Sensor Networks in Healthcare. 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR). :1–6.
.
2021. The problem of maintaining the privacy of sensitive healthcare data is crucial yet the significance of research efforts achieved still need robust development in privacy protection techniques for Wireless Multimedia Sensor Networks (WMSNs). This paper aims to investigate different privacy-preserving methods for WMSNs that can be applied in healthcare, to guarantee a privacy-aware transmission of multimedia data between sensors and base stations. The combination of ant colony optimization-based routing and hierarchical structure of the network have been proposed in the AntSensNet WMSN-based routing protocol to offer QoS and power efficient multipath multimedia packet scheduling. In this paper, the AntSensNet routing protocol was extended by utilizing privacy-preserving mechanisms thus achieving anonymity / pseudonymity, unlinkability, and location privacy. The vulnerability of standard AntSensNet routing protocol to privacy threats have raised the need for the following privacy attacks’ countermeasures: (i) injection of fake traffic, which achieved anonymity, privacy of source and base locations, as well as unlinkability; (ii) encrypting and correlating the size of scalar and multimedia data which is transmitted through a WMSN, along with encrypting and correlating the size of ants, to achieve unlinkability and location privacy; (iii) pseudonyms to achieve unlinkability. The impact of these countermeasures is assessed using quantitative performance analysis conducted through simulation to gauge the overhead of the added privacy countermeasures. It can be concluded that the introduced modifications did enhance the privacy but with a penalty of increased delay and multimedia jitter. The health condition of a patient determines the vitals to be monitored which affects the volumes and sources of fake traffic. Consequently, desired privacy level will dictate incurred overhead due to multimedia transmissions and privacy measures.
Trusted Configuration in Cloud FPGAs. 2021 IEEE 29th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). :233–241.
.
2021. In this paper we tackle the open paradoxical challenge of FPGA-accelerated cloud computing: On one hand, clients aim to secure their Intellectual Property (IP) by encrypting their configuration bitstreams prior to uploading them to the cloud. On the other hand, cloud service providers disallow the use of encrypted bitstreams to mitigate rogue configurations from damaging or disabling the FPGA. Instead, cloud providers require a verifiable check on the hardware design that is intended to run on a cloud FPGA at the netlist-level before generating the bitstream and loading it onto the FPGA, therefore, contradicting the IP protection requirement of clients. Currently, there exist no practical solution that can adequately address this challenge.We present the first practical solution that, under reasonable trust assumptions, satisfies the IP protection requirement of the client and provides a bitstream sanity check to the cloud provider. Our proof-of-concept implementation uses existing tools and commodity hardware. It is based on a trusted FPGA shell that utilizes less than 1% of the FPGA resources on a Xilinx VCU118 evaluation board, and an Intel SGX machine running the design checks on the client bitstream.