In order to secure wireless communications, we consider the usage of physical-layer security (PLS) mechanisms (i.e. coding for secrecy mechanisms) combined with self-interference generation. We present a prototype implementation of a scrambled coding for secrecy mechanism with interference generation by the legitimate receiver and the cancellation of the effect of self-interference (SI). Regarding the SI cancellation, two algorithms were evaluated: least mean square and recursive least squares. The prototype implementation is performed in real-world software-defined radio (SDR) devices using GNU-Radio.
more »
« less
SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security
In order to secure wireless communications, we consider the usage of physical-layer security (PLS) mechanisms (i.e., coding for secrecy mechanisms) combined with self-interference generation. We present a prototype implementation of a scrambled coding for secrecy mechanisms with interference generation by the legitimate receiver and the cancellation of the effect of self-interference (SI). Regarding the SI cancellation, four state-of-the-art algorithms were considered: Least mean square (LMS), normalized least mean square (NLMS), recursive least squares (RLS) and QR decomposition recursive least squares (QRDRLS). The prototype implementation is performed in real-world software-defined radio (SDR) devices using GNU-Radio, showing that the LMS outperforms all other algorithms considered (NLMS, RLS and QRDRLS), being the best choice to use in this situation (SI cancellation). It was also shown that it is possible to secure communication using only noise generation by the legitimate receiver, though a variation of the packet loss rate (PLR) and the bit error rate (BER) gaps is observed when moving from the fairest to an advantageous or a disadvantageous scenario. Finally, when noise generation was combined with the adapted scrambled coding for secrecy with a hidden key scheme, a noteworthy security improvement was observed resulting in an increased BER for Eve with minor interference to Bob.
more »
« less
- Award ID(s):
- 1910812
- PAR ID:
- 10490046
- Publisher / Repository:
- MDPI
- Date Published:
- Journal Name:
- Sensors
- Volume:
- 21
- Issue:
- 3
- ISSN:
- 1424-8220
- Page Range / eLocation ID:
- 856
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
The onset of quantum computing calls for secrecy schemes that can provide everlasting secrecy resistant to increased computational power of an adversary. One novel physical layer scheme proposes that an intended receiver capable of performing analog cancellation of a known key-based interference would hold a significant advantage in recovering small underlying messages versus an eavesdropper performing cancellation after analog-to-digital conversion. This advantage holds even if an eavesdropper later obtains the key and employs it in their digital cancellation. Inspired by this scheme, a flexible software-defined radio receiver design capable of maintaining analog cancellation ratios over 40 dB, reaching up to and over 50 dB, is implemented. Using analog cancellation levels from the hardware testbed, practical everlasting secrecy rates up to 2.0 bits/symbol are shown to be gained by receivers performing interference cancellation in analog rather than on a digital signal processor.more » « less
-
We identify a novel method of using feedback to provide enhanced information-theoretical security in the presence of an eavesdropper. This method begins with a fixed linear coset code providing both secrecy and error detection/correction, as has been described by several authors. The legitimate receiver then sends the syndrome information for the received codeword, and based on this feedback, the transmitter can provide further error correction information specifically tailored to assist only the legitimate receiver. We show that this method allows secure communication with the legitimate receiver even when the eavesdropper’s channel is superior to that of the legitimate receiver.more » « less
-
null (Ed.)Unmanned Aerial Vehicles (UAVs) have demonstrated efficacy as a platform for remote life sensing in post-disaster search and rescue applications. Radar-assisted UAV respiration motion sensing technology also shows promise yet a significant technological challenge remains associated with interfering motion artefacts from the moving UAV platform. The feasibility of integrating an adaptive filter approach for the compensation of platform motion artefacts is investigated here for the extraction of respiratory motion signatures. A 24-GHz dual radar system was attached to a mechanical mover to emulating motion artefacts while measuring the motion of a robotic breathing phantom designed to reproduce breathing motion patterns. Recursive least square (RLS) and a least mean square (LMS) adaptive filter algorithms were employed to test efficacy for extracting respiratory rate from the motion corrupted breathing signal. Experimental results demonstrated that the RLS performed best with an accuracy of 98.24% for extracting the frequency of the robotic breathing phantom mover. The proposed system has several potential applications including military, humanitarian, and post-disaster search and rescue operations.more » « less
-
Due to the open nature of wireless medium, wireless communications are especially vulnerable to eavesdropping attacks. This paper designs a new wireless communication system to deal with eavesdropping attacks. The proposed system can enable a legitimate receiver to get desired messages and meanwhile an eavesdropper to hear ``fake" but meaningful messages by combining confidentiality and deception, thereby confusing the eavesdropper and achieving additional concealment that further protects exchanged messages. Towards this goal, we propose techniques that can conceal exchanged messages by utilizing wireless channel characteristics between the transmitter and the receiver, as well as techniques that can attract an eavesdropper to gradually approach a trap region, where the eavesdropper can get fake messages. We also provide both theoretical and empirical analysis of the established secure channel between the transmitter and the receiver. We develop a prototype system using Universal Software Defined Radio Peripherals (USRPs)Experimental results show that an eavesdropper at a trap location can receive fake information with a bit error rate (BER) close to 0, and the transmitter with multiple antennas can successfully deploy a trap area.more » « less