Skip to main content
Erschienen in: Wireless Networks 1/2021

02.10.2020

Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme

verfasst von: Hassan N. Noura, Reem Melki, Rouwaida Kanj, Ali Chehab

Erschienen in: Wireless Networks | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Multiple-Input Multiple-Output (MIMO) technology is one of the key enablers of the 5G system. This technology allows the concurrent transmission of data using multiple antennas, which increases the channel robustness, overall throughput and link capacity. The security of 5G systems is very critical and it has received serious attention from various research groups. To that end, physical layer security (PLS) has recently emerged as a promising candidate to enhance network security, and several PLS schemes have been proposed for MIMO systems. Most of these MIMO PLS solutions target data confidentiality, however, they suffer from a main limitation due to relying solely on the random parameters of the channel. To overcome this limitation, we propose a PLS cipher solution for D2D MIMO systems, which is based on the dynamic key structure and several other factors including a private key and a physical channel parameter. Both of these parameters are combined to produce a dynamic key, which is used to generate the cipher primitives that are used to encrypt or decrypt data frames. For every input frame, the cipher primitives are updated, and for each frame symbol, the selection cipher primitives are updated. The update process is designed to enhance the security level and to ensure the avalanche effect in a simple and lightweight manner. Consequently, the proposed technique achieves high immunity against existing attacks due to the dynamic property which complicates the attacker’s tasks. A high efficiency level is also attained since a single round with simple cipher operations are employed. The proposed scheme decreases the required latency, resources and overhead in comparison to security schemes at upper layers of the D2D MIMO communication system. Finally, we conducted several security and performance tests to evaluate the proposed solution and to prove its robustness and efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Tsoulos, George. (2006). MIMO system technology for wireless communications. Boca Raton: CRC Press.CrossRef Tsoulos, George. (2006). MIMO system technology for wireless communications. Boca Raton: CRC Press.CrossRef
2.
Zurück zum Zitat Sivakrishna, S., and Yarrabothu, R. (2018). Design and simulation of 5g massive MIMO kernel algorithm on SIMD vector processor. In Conference on signal processing and communication engineering systems (SPACES), pp. 53–57. IEEE Sivakrishna, S., and Yarrabothu, R. (2018). Design and simulation of 5g massive MIMO kernel algorithm on SIMD vector processor. In Conference on signal processing and communication engineering systems (SPACES), pp. 53–57. IEEE
3.
Zurück zum Zitat Melki, R., Noura, H., Mansour, M., & Chehab, A. (2020). Physical layer security schemes for MIMO systems: an overview. Wireless Networks, 26(3), 2089–2111.CrossRef Melki, R., Noura, H., Mansour, M., & Chehab, A. (2020). Physical layer security schemes for MIMO systems: an overview. Wireless Networks, 26(3), 2089–2111.CrossRef
4.
Zurück zum Zitat Melki, R., Noura, H., Mansour, M., & Chehab, A. (2019). A survey on OFDM physical layer security. Physical Communication, 32, 1–30.CrossRef Melki, R., Noura, H., Mansour, M., & Chehab, A. (2019). A survey on OFDM physical layer security. Physical Communication, 32, 1–30.CrossRef
5.
Zurück zum Zitat Yaacoub, E., and Al-Husseini, M. (2017). Achieving physical layer security with massive MIMO beamforming. In 2017 11th European conference on antennas and propagation (EUCAP), pp. 1753–1757, March Yaacoub, E., and Al-Husseini, M. (2017). Achieving physical layer security with massive MIMO beamforming. In 2017 11th European conference on antennas and propagation (EUCAP), pp. 1753–1757, March
7.
Zurück zum Zitat Li, X., Huang, H. C., Lozano, A., & Foschini, G. J. (2000). Reduced-complexity detection algorithms for systems using multi-element arrays. In Globecom’00-IEEE. global telecommunications conference. Conference record (Cat. No. 00CH37137), (Vol. 2, pp. 1072–1076). IEEE Li, X., Huang, H. C., Lozano, A., & Foschini, G. J. (2000). Reduced-complexity detection algorithms for systems using multi-element arrays. In Globecom’00-IEEE. global telecommunications conference. Conference record (Cat. No. 00CH37137), (Vol. 2, pp. 1072–1076). IEEE
8.
Zurück zum Zitat Salameh, H., et al. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5(3), 1904–1913.CrossRef Salameh, H., et al. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5(3), 1904–1913.CrossRef
9.
Zurück zum Zitat Delfs, H., Knebl, H., & Knebl, H. (2002). Introduction to cryptography (Vol. 2). Berlin: Springer.CrossRef Delfs, H., Knebl, H., & Knebl, H. (2002). Introduction to cryptography (Vol. 2). Berlin: Springer.CrossRef
10.
Zurück zum Zitat Buyya, R., Calheiros, R., & Dastjerdi, A. (2016). Big data: Principles and paradigms. Burlington: Morgan Kaufmann. Buyya, R., Calheiros, R., & Dastjerdi, A. (2016). Big data: Principles and paradigms. Burlington: Morgan Kaufmann.
11.
Zurück zum Zitat Tanigawa et al. Y., (2017). A physical layer security scheme employing imaginary receiver for multiuser MIMO-OFDM systems. In International conference on communications (ICC), pp. 1–6 Tanigawa et al. Y., (2017). A physical layer security scheme employing imaginary receiver for multiuser MIMO-OFDM systems. In International conference on communications (ICC), pp. 1–6
12.
Zurück zum Zitat Ahmed, M., & Lin, Bai (2017). Space time block coding aided physical layer security in gaussian MIMO channels. In International Bhurban conference on applied sciences and technology (IBCAST), pp. 805–808 Ahmed, M., & Lin, Bai (2017). Space time block coding aided physical layer security in gaussian MIMO channels. In International Bhurban conference on applied sciences and technology (IBCAST), pp. 805–808
13.
Zurück zum Zitat Li, G., & Hu, A. (2016). Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security. In IEEE proc. int. conf. commun. China (ICCC), pp. 2246–2250 Li, G., & Hu, A. (2016). Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security. In IEEE proc. int. conf. commun. China (ICCC), pp. 2246–2250
14.
Zurück zum Zitat Zhang, Y., et. al. (2015). Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels. In IEEE proc. int. conf. commun. China (ICCC), pp. 1–6 Zhang, Y., et. al. (2015). Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels. In IEEE proc. int. conf. commun. China (ICCC), pp. 1–6
15.
Zurück zum Zitat Fan, Y., et al. (2017). Physical layer security based on interference alignment in K-User MIMO Y wiretap channels. IEEE Access, 5, 5747–5759.CrossRef Fan, Y., et al. (2017). Physical layer security based on interference alignment in K-User MIMO Y wiretap channels. IEEE Access, 5, 5747–5759.CrossRef
16.
Zurück zum Zitat Chen, X., & Zhang, Y. (2017). Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Systems Journal, 11(2), 1128–1136.CrossRef Chen, X., & Zhang, Y. (2017). Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Systems Journal, 11(2), 1128–1136.CrossRef
17.
Zurück zum Zitat Thangaraj, A., Dihidar, S., Calderbank, A., McLaughlin, S., & Merolla, J. (2007). Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory, 53(8), 2933–2945.MathSciNetCrossRef Thangaraj, A., Dihidar, S., Calderbank, A., McLaughlin, S., & Merolla, J. (2007). Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory, 53(8), 2933–2945.MathSciNetCrossRef
19.
Zurück zum Zitat Csiszár, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.MathSciNetCrossRef Csiszár, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.MathSciNetCrossRef
20.
Zurück zum Zitat Subramanian, A., Thangaraj, A., Bloch, M., & McLaughlin, S. (2011). Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Transactions on Information Forensics and Security, 6(3), 585–594.CrossRef Subramanian, A., Thangaraj, A., Bloch, M., & McLaughlin, S. (2011). Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Transactions on Information Forensics and Security, 6(3), 585–594.CrossRef
22.
Zurück zum Zitat Fang, X., Zhang, N., Zhang, S., Chen, D., Sha, X., & Shen, X. (2017). On physical layer security: Weighted fractional Fourier transform based user cooperation. IEEE Transactions on Wireless Communications, 16(8), 5498–5510.CrossRef Fang, X., Zhang, N., Zhang, S., Chen, D., Sha, X., & Shen, X. (2017). On physical layer security: Weighted fractional Fourier transform based user cooperation. IEEE Transactions on Wireless Communications, 16(8), 5498–5510.CrossRef
23.
Zurück zum Zitat Usama, M., Rehman, O., Memon, I., & Rizvi, S. (2019). An efficient construction of key-dependent substitution box based on chaotic sine map. International Journal of Distributed Sensor Networks, 15(12), 1550147719895957.CrossRef Usama, M., Rehman, O., Memon, I., & Rizvi, S. (2019). An efficient construction of key-dependent substitution box based on chaotic sine map. International Journal of Distributed Sensor Networks, 15(12), 1550147719895957.CrossRef
24.
Zurück zum Zitat Zhao, X., Abdo, A., Xu, C., Geng, S., Zhang, J., & Memon, I. (2018). Dimension reduction of channel correlation matrix using CUR-decomposition technique for 3-D massive antenna system. IEEE Access, 6, 3031–3039.CrossRef Zhao, X., Abdo, A., Xu, C., Geng, S., Zhang, J., & Memon, I. (2018). Dimension reduction of channel correlation matrix using CUR-decomposition technique for 3-D massive antenna system. IEEE Access, 6, 3031–3039.CrossRef
25.
Zurück zum Zitat Abdo, A., Zhao, X., Zhang, R., Zhou, Z., Zhang, J., Zhang, Y., et al. (2018). MU-MIMO downlink capacity analysis and optimum code weight vector design for 5G big data massive antenna millimeter wave communication. Wireless Communications and Mobile Computing,. https://doi.org/10.1155/2018/7138232.CrossRef Abdo, A., Zhao, X., Zhang, R., Zhou, Z., Zhang, J., Zhang, Y., et al. (2018). MU-MIMO downlink capacity analysis and optimum code weight vector design for 5G big data massive antenna millimeter wave communication. Wireless Communications and Mobile Computing,. https://​doi.​org/​10.​1155/​2018/​7138232.CrossRef
26.
Zurück zum Zitat Shifa, A., Afgan, M. S., Asghar, M. N., Fleury, M., Memon, I., Abdullah, S., et al. (2018). Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access, 6, 16189–16206.CrossRef Shifa, A., Afgan, M. S., Asghar, M. N., Fleury, M., Memon, I., Abdullah, S., et al. (2018). Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access, 6, 16189–16206.CrossRef
28.
Zurück zum Zitat Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.CrossRef Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.CrossRef
29.
Zurück zum Zitat Memon, I., & Arain, Q. (2017). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 639–672.CrossRef Memon, I., & Arain, Q. (2017). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 639–672.CrossRef
30.
Zurück zum Zitat Melki FN: R., et al. (2018). An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal, 6, 361.CrossRef Melki FN: R., et al. (2018). An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal, 6, 361.CrossRef
31.
Zurück zum Zitat Noura, H., et al. (2018). A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach. Mobile Networks and Applications, 24, 447.CrossRef Noura, H., et al. (2018). A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach. Mobile Networks and Applications, 24, 447.CrossRef
32.
Zurück zum Zitat Noura, H., et al. (2018). Efficient and secure physical encryption scheme for low-power wireless M2M devices. In IWCMC security symposium, Limassol: Cyprus Noura, H., et al. (2018). Efficient and secure physical encryption scheme for low-power wireless M2M devices. In IWCMC security symposium, Limassol: Cyprus
33.
Zurück zum Zitat Noura, H., Chehab, A., Sleem, L., Noura, M., Couturier, R., & Mansour, M. M. (2018). One round cipher algorithm for multimedia IoT devices. Multimedia Tools and Applications, 77(14), 18383–18413.CrossRef Noura, H., Chehab, A., Sleem, L., Noura, M., Couturier, R., & Mansour, M. M. (2018). One round cipher algorithm for multimedia IoT devices. Multimedia Tools and Applications, 77(14), 18383–18413.CrossRef
34.
Zurück zum Zitat Baldini, G., Giuliani, R., & Dimc, F. (2019). Physical layer authentication of internet of things wireless devices using convolutional neural networks and recurrence plots. Internet Technology Letters, 2(2), e81.CrossRef Baldini, G., Giuliani, R., & Dimc, F. (2019). Physical layer authentication of internet of things wireless devices using convolutional neural networks and recurrence plots. Internet Technology Letters, 2(2), e81.CrossRef
Metadaten
Titel
Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme
verfasst von
Hassan N. Noura
Reem Melki
Rouwaida Kanj
Ali Chehab
Publikationsdatum
02.10.2020
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 1/2021
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02468-z

Weitere Artikel der Ausgabe 1/2021

Wireless Networks 1/2021 Zur Ausgabe