Abstract:Secret key establishment based on parameters of the communication channel is a highly attractive option for many applications that operate in a dynamic mobile environment with peer-to-peer association. On the other hand, high usability and dynamic key management are still very difficult to achieve for wireless devices which have to operate under strict resource constraints. In fact, most previously reported key generation methods cannot operate in such environment. In this work, we present a new system archite… Show more
“…While many works have focused on extracting secret keys (e.g. to be used for encryption and decryption of user data), such as [7], [8], [9], the focus of our work is to identify the original transmitter of data packets by exploiting the related PHY metadata.…”
Section: Related Workmentioning
confidence: 99%
“…As it is in some cases necessary to reduce the dimensionality M of the the input feature in order to avoid overfitting or underfitting, we also add a preprocessing step for that purpose. This reduces the number of features of the original sample from M = 48 to M red ∈ [1,2,3,4,6,8,12,16,24,48] by either sampling the original feature vector at the respective rate yielding F red (k, ℓ * ) = F (k, ℓ * M M red ), ℓ * = 0, . .…”
PHYSEC based message authentication can, as an alternative to conventional security schemes, be applied within Ultra Reliable Low Latency Communication (URLLC) scenarios in order to meet the requirement of secure user data transmissions in the sense of authenticity and integrity. In this work, we investigate the performance of supervised learning classifiers for discriminating legitimate transmitters from illegimate ones in such scenarios. We further present our methodology of data collection using Software Defined Radio (SDR) platforms and the data processing pipeline including e.g. necessary preprocessing steps. Finally, the performance of the considered supervised learning schemes under different side conditions is presented.
“…While many works have focused on extracting secret keys (e.g. to be used for encryption and decryption of user data), such as [7], [8], [9], the focus of our work is to identify the original transmitter of data packets by exploiting the related PHY metadata.…”
Section: Related Workmentioning
confidence: 99%
“…As it is in some cases necessary to reduce the dimensionality M of the the input feature in order to avoid overfitting or underfitting, we also add a preprocessing step for that purpose. This reduces the number of features of the original sample from M = 48 to M red ∈ [1,2,3,4,6,8,12,16,24,48] by either sampling the original feature vector at the respective rate yielding F red (k, ℓ * ) = F (k, ℓ * M M red ), ℓ * = 0, . .…”
PHYSEC based message authentication can, as an alternative to conventional security schemes, be applied within Ultra Reliable Low Latency Communication (URLLC) scenarios in order to meet the requirement of secure user data transmissions in the sense of authenticity and integrity. In this work, we investigate the performance of supervised learning classifiers for discriminating legitimate transmitters from illegimate ones in such scenarios. We further present our methodology of data collection using Software Defined Radio (SDR) platforms and the data processing pipeline including e.g. necessary preprocessing steps. Finally, the performance of the considered supervised learning schemes under different side conditions is presented.
“…the AP and an ED, estimate the channel characteristics they experience mutually for a specific amount of time in order to derive a shared secret which can be used as a session key for ciphering (this approach has e.g. been considered in [Guillaume et al (2015)], [Zenger et al (2014)] and [Wilhelm et al (2013)]). Let the channel estimated by the ED due to the AP at time k be H AP-ED are equal when they are conducted during the coherence time of the channel and in the absence of errors (e.g.…”
The Design of new wireless communication systems for industrial applications, e.g. control applications, is currently a hot research topic, as they deal as a key enabler for more flexible solutions at a lower cost compared to systems based on wired communication. However, one of their main drawbacks is, that they provide a huge potential for miscellaneous cyber attacks due to the open nature of the wireless channel in combination with the huge economic potential they are able to provide. Therefore, security measures need to be taken into account for the design of such systems. Within this work, an approach for the security architecture of local wireless systems with respect to the needs of control applications is presented and discussed. Further, new security solutions based on Physical Layer Security are introduced in order to overcome the drawbacks of state of the art security technologies within that scope.
“…In [2] a good overview on this topic is given. While many works have focused on extracting secret keys between two communicating devices, such as [3], [4], [5], the focus of our work is on guaranteeing secure transmission with respect to authenticity of data packets from one device to another. One of the first works considering that idea has been for example [6], where an approach based on simulation of the wireless channel and hypothesis testing is presented for static scenarios and is later in [7] extended to time-variant scenarios.…”
Abstract-The application of Mission Critical Machine Type Communication (MC-MTC) in wireless systems is currently a hot research topic. Wireless systems are considered to provide numerous advantages over wired systems in e.g. industrial applications such as closed loop control. However, due to the broadcast nature of the wireless channel, such systems are prone to a wide range of cyber attacks. These range from passive eavesdropping attacks to active attacks like data manipulation or masquerade attacks. Therefore it is necessary to provide reliable and efficient security mechanisms. Some of the most important security issues in such a system are to ensure integrity as well as authenticity of exchanged messages over the air between communicating devices. In the present work, an approach on how to achieve this goal in MC-MTC systems based on Physical Layer Security (PHYSEC) is presented. A new method that clusters channel estimates of different transmitters based on a Gaussian Mixture Model is applied for that purpose. Further, an experimental proof-ofconcept evaluation is given and we compare the performance of our approach with a mean square error based detection method.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.