In this paper, we consider the physical layer security of an RIS-assisted multiple-antenna communication system with randomly located eavesdroppers. The exact distributions of the received signal-to-noise-ratios (SNRs) at the legitimate user and the eavesdroppers located according to a Poisson point process (PPP) are derived, and a closed-form expression for the secrecy outage probability (SOP) is obtained. It is revealed that the secrecy performance is mainly affected by the number of RIS reflecting elements, and the impact of the transmit antennas and transmit power at the base station is marginal. In addition, when the locations of the randomly located eavesdroppers are unknown, deploying the RIS closer to the legitimate user rather than to the base station is shown to be more efficient. We also perform an analytical study demonstrating that the secrecy diversity order depends on the path loss exponent of the RIS-to-ground links. Finally, numerical simulations are conducted to verify the accuracy of these theoretical observations.
more »
« less
Authentication and PHY-Security Schemes for Electric Vehicle Dynamic Wireless Charging
This article proposes authentication and physical layer security schemes to improve secure communications between the electric vehicle (EV) and charging infrastructure in dynamic wireless power transfer (DWPT) systems. In particular, a double-encryption with the signature (DoES) scheme is proposed for session key exchange between EV and charging station which provides data authenticity and integrity. To enable low-latency authentication between EV and power transmitter (PT) in DWPT systems, a sign-encrypt-message (SEM) authentication code scheme is designed leveraging symmetric keys for dynamic charging, which ensures privacy and resistance to tampering attacks. The artificial noise-based physical layer security (AN-based PLS) scheme is also proposed at the physical layer to degrade the wiretapped signal quality of multiple eavesdroppers operating in non-colluding and colluding cases. Closed-form expressions for the secrecy outage probability (SOP) and intercept probability (IP) of the considered system with the non-colluding case are derived to show that the proposed AN-based PLS scheme provides lower SOP and IP than the conventional ones without AN. The distance between eavesdroppers and the PT also affects the system SOP and IP in both non-colluding and colluding cases. Moreover, the EV using the DoES scheme takes 52 ms for obtaining session keys from the charging station while it only spends 8.23 ms with the SEM scheme to authenticate with PT for the charging process.
more »
« less
- PAR ID:
- 10527016
- Publisher / Repository:
- IEEE Transactions on Vehicular Technology
- Date Published:
- Journal Name:
- IEEE Transactions on Vehicular Technology
- Volume:
- 73
- Issue:
- 2
- ISSN:
- 0018-9545
- Page Range / eLocation ID:
- 1698 to 1712
- Subject(s) / Keyword(s):
- Authentication Vehicle dynamics Security Protocols Transmitters Wireless communication Cryptography Authentication dynamic charging electric vehicles privacy secure wireless networks wireless power transfer
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Reconfigurable intelligent surface (RIS) technology is emerging as a promising technique for performance enhancement for next-generation wireless networks. This paper investigates the physical layer security of an RIS-assisted multiple-antenna communication system in the presence of random spatially distributed eavesdroppers. The RIS-to-ground channels are assumed to experience Rician fading. Using stochastic geometry, exact distributions of the received signal-to-noise-ratios (SNRs) at the legitimate user and the eavesdroppers located according to a Poisson point process (PPP) are derived, and closed-form expressions for the secrecy outage probability (SOP) and the ergodic secrecy capacity (ESC) are obtained to provide insightful guidelines for system design. First, the secrecy diversity order is obtained as 2α2 , where α2 denotes the path loss exponent of the RIS-to-ground links. Then, it is revealed that the secrecy performance is mainly affected by the number of RIS reflecting elements, N, and the impact of the number of transmit antennas and transmit power at the base station is marginal. In addition, when the locations of the randomly located eavesdroppers are unknown, deploying the RIS closer to the legitimate user rather than to the base station is shown to be more efficient. Moreover, it is also found that the density of randomly located eavesdroppers, λe , has an additive effect on the asymptotic ESC performance given by log2(1/λe) . Finally, numerical simulations are conducted to verify the accuracy of these theoretical observations.more » « less
-
null (Ed.)We conducted a survey of 67 graduate students enrolled in the Privacy and Security in Healthcare course at Indiana University Purdue University Indianapolis. This was done to measure user preference and their understanding of usability and security of three different Electronic Health Records authentication methods: single authentication method (username and password), Single sign-on with Central Authentication Service (CAS) authentication method, and a bio-capsule facial authentication method. This research aims to explore the relationship between security and usability, and measure the effect of perceived security on usability in these three aforementioned authentication methods. We developed a formative-formative Partial Least Square Structural Equation Modeling (PLS-SEM) model to measure the relationship between the latent variables of Usability, and Security. The measurement model was developed using five observed variables (measures). - Efficiency and Effectiveness, Satisfaction, Preference, Concerns, and Confidence. The results obtained highlight the importance and impact of these measures on the latent variables and the relationship among the latent variables. From the PLS-SEM analysis, it was found that security has a positive impact on usability for Single sign-on and bio-capsule facial authentication methods. We conclude that the facial authentication method was the most secure and usable among the three authentication methods. Further, descriptive analysis was done to draw out the interesting findings from the survey regarding the observed variables.more » « less
-
Due to environmental concerns, electric vehicles (EVs) have become increasingly popular in recent decades. While EV s offer several benefits, they also present challenges such as prolonged charging times and range anxiety. To address these issues and enhance EV market participation, dynamic wireless power transfer (DWPT) is gaining a great attention in electrified-transportation sector, leading to an emergence of DWPT for EVs. DWPT offers advantages like charging while in-motion. However, DWPT roadways also impose additional demands on the power system, potentially increasing operational costs. The main objective of this paper is to manage effectively the additional load caused by DWPT roadways, and this paper presents the utilization of distributed energy resources (DERs), such as photovoltaic (PV) systems and battery storage system (BSS), to minimize the system costs. The importance of our proposed load management strategy becomes even more critical during extreme events. Therefore, this paper further examines two scenarios, i.e., normal operations and under extreme conditions considering line outages, to compare the costs associated with DWPT systems. The efficiency of the proposed method is validated using IEEE 33-bus distribution systems through a mixed integer linear programming (MILP) optimization problem. Test results demonstrate that integrating DWPT system increases the system costs under both normal and extreme conditions, however, the DER-based mechanism is capable of mitigating these costs optimally.more » « less
-
As electric vehicles (EVs) become increasingly common in transportation infrastructures, the need to strengthen and diversify the EV charging systems becomes more necessary. Dynamic Wireless Power Transfer (DWPT) roadways allow EVs to be recharged while in-motion, thus allowing to improve the driving ranges and facilitating the widespread adoption of EVs. One major challenge to adopt large-scale DWPT networks is to efficiently and accurately develop load demand models to comprehend the complex behavior on power distribution grid due to difficulty in developing power electronic simulations for charging systems consisting of either numerous transmitter pads or high traffic volumes. This paper proposes a novel modified Toeplitz convolution method for efficient large-scale DWPT load demand modeling. The proposed method achieves more accurate modeling of DWPT systems from a few transmitter pads to tens of miles in real-world traffic scenarios with light computational load. Test results for a small-scale DWPT system are first generated to validate the accuracy of the proposed method before scaling to large-scale load demand modeling where real-world traffic flow data is utilized in DWPT networks ranging from 2–10 miles. A comparative analysis is further performed for the scenarios under consideration to demonstrate the efficiency and accuracy of the proposed method.more » « less
An official website of the United States government

