All chapters_modified
All chapters_modified
CHAPTER 1
INTRODUCTION
1.1 MOTIVATION
Physical Layer (PHY) of wireless network model and uses the unique
properties of the wireless communication medium to provide security.
with the public key and decryption of data is done with the private key to
provide confidentiality. But sharing of public key is the major concern in this
technique.
Cryptographic
S. No Feature PLS approach
approach
1 Security Depends heavily on Depends on channel
encryption algorithm characteristics
2 Computational Encryption & decryption Relatively simple signal
Complexity algorithms are highly processing with little
complex overheads
3 Type of wireless Devices with no Small and light weighted
devices restrictions on power, devices (in terms of
storage and processing power, storage and
processing)
4 Challenges Key distribution and No pre-sharing or
management in large exchange of secret keys
scale networks
5 Type of security Personalised and Flexible configurations of
differentiated security is security levels are possible
not possible for which are required for
diversified services diversified services
secret key (Liu et al. 2013). The characteristic of a good security scheme is to
have low BMR for legitimate users.
during a long coherent time, the mapping patterns are not varied and become
vulnerable to attacks by eavesdroppers.
CHAPTER 2
2.1 INTRODUCTION
( ) = ( ). ( ) + ( ) (2.1)
( )
( ) = | ( )| (2.2)
Figure 2.1, shows the signal flow starting from session initialization
to end of transmission between Tx and Rx in the presence of eavesdroppers.
Two types of eavesdroppers, random and intelligent attackers, with different
capabilities are assumed. Session initialization is carried out using pilot
signals before commencement of data transmission. Pilot signals are
transmitted and estimation of SNR and phase is performed at Tx and Rx. The
estimation process is followed by the modulation and transmission of signal
from Tx. For the purpose of analysis, phase shift keying (PSK) modulation of
different orders is considered. Depending on the estimated parameters at Rx,
demodulation of the received signal is carried out. If the estimated SNR or
phase values falls in their respective guard interval, 'no transmission' is
declared which results in re-initialization of session by exchanging pilot
signals again. Guard interval is the cushion between two consecutive regions
of interest, which is explained subsequently. The condition of no transmission
is assumed in order to reduce the SER which may occur due to mismatch of
modulation types selected at Tx and Rx. During the initialization process,
when pilot signals are exchanged, intelligent attacker also tries to estimate the
channel SNR and phase. Random attacker does no estimation but randomly
chooses SNR and phase. During the transmission process, both random and
intelligent attacker demodulates the signal.
31
( )= (2.3)
where m is the symbol index in the bit block of size M. Depending on the
channel phase, particular Pm and subsequently the modulation level is chosen
with a symbol length of log2m. Pm can be represented as
( )
= ( )< (2.4)
34
where ( ) is the phase interval. Then message bits are mapped into symbols
as per the selected modulation type.
Phase
Modulation Phase interval Modulation
SNR Sets
Size (M) () Type
(Pm)
< 7dB 1 P1 0 (t) < 2 BPSK
= ( ( ). ) 360 (2.5)
= ( ) ( ) (2.6)
36
= () ( ) (2.7)
( , ( ))
= ( , ( ))
(2.8)
where is the probability that ( ) lies in the region RM. R and R are the
upper and lower bounds of RM respectively. The function is the uniform
probability density function (pdf) of and is given as,
= (2.9)
0,
( , ( ))
= ( ( ))
(2.10)
,
where is the probability that ( ) lies in the area Am. A and A are the
upper and lower bounds of Am respectively. Similarly, the function is the
uniform pdf of and is given as,
= (2.11)
0,
guard interval g is introduced for SNR estimation error between the upper
bound and lower bound of two consecutive SNR regions. Figure 2.3 shows
the representation of guard interval for SNR estimation.
If the estimated values of SNR or phase fall in the guard interval for
a particular session, the signal transmission for that session is withheld and
channel estimation process is repeated for another pilot signal. To achieve
zero probability of incorrect modulation, guard interval at Tx should be equal
to maximum phase estimation error at receiver, for example, g = r and
g = r.
= + (1 ) (2.14)
( ) = | ( )| ( ) ( )
+ ( ) (2.15)
phase estimation error exceeds half of the detection area of the transmitted
40
symbol. For example, for M=6, if the modulation type used is QPSK, the
transmitted symbol will be incorrectly detected only if | ( )| > . Based on
the channel SNR, M value is chosen and by considering only the phase
estimation error, symbol error at receiver is formulated as follows
= . | ( )| > (2.16)
( , )
= ,
+ (2.17)
=1 , (2.18)
of m).
A random attacker is the one, who does not have any knowledge of
the channel SNR and phase. Hence demodulation by a random attacker is
done by randomly choosing a SNR and phase. Random attacker is modelled
to randomly choose a SNR rnds which is uniformly distributed in interval [0,
50] and a phase rndp which is uniformly distributed in interval [0, ].
is more for SNR with M=6 than for M=2, in this case. Figure 2.7 shows the
probability of selecting incorrect modulation due to phase estimation error
2) versus maximum phase estimation error at Rx ( r) for different SNR
values. From the results it can be observed that, the probability of choosing
different modulation types at Tx & Rx increases with increasing r.
Figure 2.10 The Average SER obtained at Rx versus SNR for proposed
and existing scheme for different values of M
Figure 2.11 shows the SER for different values of SNR with M = 2
& 4 for legitimate receiver Rx and random attacker. It can be seen that even at
high SNR, the average SER of random attacker is very high irrespective of M,
whereas the SER of the legitimate receiver is much less. Similarly, the
48
Figure 2.11 Average SER for Rx and random attacker for M = 2 & 4
Figure 2.12 Average SER for Rx and intelligent attacker for M = 2 & 4
Figure 2.13 Average SER for random attackers versus SNR for
M=2&4
50
Figure 2.14 Average SER for intelligent attackers versus SNR for
M=2&4
51
2.6 CONCLUSION
CHAPTER 3
3.1 INTRODUCTION
coherence time (Longwang et al. 2017) for quantization and key generation.
The eavesdropper channel (radio channel between the eavesdropper and
legitimate users) and legitimate channel are uncorrelated because the distance
between eavesdropper to both the legitimate users is more than /2 where is
the wavelength of the transmitted signal (Jakes 1994).
Step 1: Key Generation - Probe the legitimate channel and estimate CSI.
Generate secret key K from CSI at transmitter and receiver. The
steps involved in secret key generation are detailed in section 3.3.1.
Algorithm 1:
Input: Number of CSI samples N, Absolute values of CSI S
Step 1: Find and of
(max( ) + min( ))
Step 2: Find quantization threshold = 2
Step 3: for =1
>
=1
=0
end
end
Step 4: ( )
=
( > 2)
=
end
Repeat step 3 onwards;
end
Output: Secret Key, K
In SM, there are two information bearing units namely the index of
transmit antenna and symbol from signal constellation, which is transmitted
59
The total bpcu is 4 (2 bits for codeword, two bits for symbol from
primary constellation or two one bit for symbol from secondary
constellation). It is worth mentioning that the bpcu of conventional SM-
MIMO for same configuration is only 3 bits. The constellation diagram is
shown in Figure 3.3.
1.5
0.5
-0.5
-1
-1.5
-2
-2 -1.5 -1 -0.5 0 0.5 1 1.5 2
Real
Figure 3.3 Constellation details for M=4. Circles represent QPSK, plus
represent the BPSK0 and cross represent the BPSK1
Imaginary
The total bpcu is 10 (4 bits for selection of codeword, six bits for
symbol from primary constellation or 2 three bits for symbol from secondary
constellation). It is noteworthy to indicate that the bpcu of conventional SM-
MIMO for same configuration is only 8 bits. The combinations in the
codebook are tabulated in Table 3.3. The constellation diagram is shown in
Figure 3.5.
62
2
Imaginary
-2
-4
-6
-8
-8 -6 -4 -2 0 2 4 6 8
Real
Figure 3.5 Constellation details for M=64. Dots represent 64QAM, plus
represent the 8APK0 and cross represent the 8APK1
63
SNR (dB) M
<13 4
13 to 20 16
>20 64
Algorithm 2:
Input: Codeword array to be shuffled c[N], Key K
=( 1) 0
= 2 ( ), ( 1)
[] []
end
Output: Shuffled codeword array c[N]
Figure 3.6 Codebook before and after shuffling using the key
users which lead to non-identical CSI of adversary. For the analysis, the
distance between adversary and users are modelled in terms of SNR using
free space path loss model. When users are far away from adversary, the
wiretap channels are uncorrelated and it is impossible for adversary to
generate the correct secret key from its channel measurements. When
adversary is close to one of the users, the channel parameters are slightly
correlated because SNR values are notably high. The key disagreement
between user and adversary decreases. Figure 3.7 depicts the KDR between
user and adversary in percentage for different values of SNR. The worst
unacceptable disagreement between user and adversary can occur when they
both are close (high SNR) and it is observed to be 3% which means 7 bits are
mismatching in 256 bits length secret key. Hence it becomes prudent to
ensure the security by analyzing the effect of number of mismatched bits on
confidentiality.
mentioning that the proposed scheme is robust to protect security even if there
is at least one bit difference in key between eavesdropper and user.
= (m + 2log2NT)/W (3.2)
= (3.3)
m + 2log2NT
= (3.4)
m + log2NT
ECPLEASM = [ + 2 + 2 ] (3.5)
ECSM-MIMO = (3.6)
ECPLEASM
= (3.7)
ECSM-MIMO
REC= + 2 + 2 (3.8)
= (3.9)
ESM schemes for M=64 with Ps = 33 and Ps = 57.5 for a bpcu of 8 and 9
respectively.
SM-MIMO PLEASM
M RSE REC REE
Ps bpcu Ps bpcu
4 2 3 2 4 1.33 1.00 1.33
16 10 5 11 6 1.20 1.10 1.09
64 42 7 33 8 1.14 0.79 1.45
Similar analysis has been carried out for four transmitting antennas
(NT=4). Table 3.6 lists the various parameters for analyzing spectral
efficiency for four transmit antennas. All the discussions made for NT = 2
holds good for NT = 4 as well. The energy consumption for M=4, is same in
both schemes and for M=16, the energy consumption is 15% higher in
PLEASM. The constellation points for secondary modulation schemes and
number of combinations in M=64 is so chosen in such a way that the energy
consumption in PLEASM is 32% less than SM-MIMO. Figure 3.12 shows the
improvement in bpcu for the proposed PLEASM method over the existing
SM-MIMO method for NT=4.
SM-MIMO PLEASM
M RSE REC REE
Ps bpcu Ps bpcu
4 2 4 2 6 1.50 1.00 1.50
16 10 6 11.5 8 1.33 1.15 1.16
64 42 8 28.5 10 1.25 0.68 1.84
3.5 CONCLUSION
The simulation results have shown that the key disagreement ratio
between user and adversary for worst case scenario of close proximity
between user and adversary, with SNR of 20 dB at adversary, is only 3%
which corresponds to seven bits of disagreement error for a key length of 256
bits. However even with only one bit difference in secret key it has been
76
analyzed that the adversary cannot decode any information. For NT = 2 and 4,
the BER performance of the legitimate users is around 10-4 at SNR of 27 dB
whereas for eavesdropper it is 0.5. The performance analysis has shown that
the MIMO eavesdropper cannot retrieve any useful information even being
closer to legitimate users whereas legitimate users can recover information
bits correctly with improved spectral efficiency.
CHAPTER 4
4.1 INTRODUCTION
LBS system model consists of MU, trusted AP, LBS provider, and
adversaries, as depicted in Figure 4.1. Service to the user is provided by an
LBS provider through trusted AP upon receiving the location information and
identity (ID) from the user. Trusted APs are connected to LBS servers
80
adversaries track the handshake frames and acquire user ID from Wi-Fi
preambles.
= (4.1)
( ) = ( ). ( )
(4.2)
where A(t) and (t) are magnitude and phase of the signal. The received
baseband signal r(t) is represented as
( ) = ( ). ( / )
(4.3)
( ) = ( ). ( ) ( / )
. (4.4)
[ ( ) ]
( ) = ( ). (4.5)
the user from adversaries during the handshake phase, a secured handshake
phase protocol is being followed, as shown in Figure 4.3.
K. Since K is available only with user and provider, the adversaries obtain no
knowledge about the encrypted frame.
Algorithm 1: Secrete Key generation and encryption using SVD & CFO
Secrete Key generation
Initialize secret key K= [ ];
Input: CSI vector length N, H matrix size m, n
Step1: Obtain the CSI vectors [ ,.., ];
Step2: Reshape CSI vectors of length N into Matrix H of dimension m x n;
[ ,.., ]
Step3: Compute SVD for channel matrix by decomposing H into U VH;
0
= , where p=min {m, n};
Figure 4.5 shows the BMR for different bucket sizes, for the TLDC
method proposed in PriLA. This method achieves low BMR for less number
of buckets and high BMR for large number of buckets. The reason is that
when the number of buckets is large, the entropy of bucket is fairly small,
indicating low uncertainty in the generated bits. Hence, for a large number of
bucket sizes, the mismatch rate is high leading to a high bit mismatch.
However for achieving less BMR, the number of buckets preferred is one or
two which leads to computational complexity arising due to processing using
only one or two buckets.
91
Figure 4.5 BMR of the existing method for different bucket sizes
Figure 4.6 shows the BMR of the proposed SPPLAS method which
is plotted against different sizes of H matrix used for SVD. The matrix size of
the proposed SPPLAS method is the counterpart to the bucket size of the
TLDC technique used in existing PriLA method. Low BMR is achieved when
the matrix size is less which gives additional advantage of less computational
completity. Thus in the proposed method, secret keys can be generated with
less BMR using smaller matrices with less computional complexity than the
existing method.
Figure 4.6 BMR of the proposed method for different SVD matrix size
about 2 dB than the existing method for a BER around 10-4. Also, it can be
observed at SNR of 12 dB, the existing method achieves a BER around 10-4
whereas the proposed method achieves a BER of 10-5. The receiver
performance without encryption shows only a slight difference on decoding,
when compared with the proposed method which confirms that the encryption
process does not detriment the overall receiver performance.
Figure 4.9 and Figure 4.10 shows the BER performance of the
receiver in the presence of adversary for 4 QAM and 64 QAM system
respectively. For a 4 QAM system, at SNR value of 14 dB, the BER of
adversary is 0.5 wheres for receiver it is low of the order of 10-7. Similarly,
for a 64 QAM system, the BER of adversary is 0.5 wheres for receiver it is
10-7 at SNR value of 30 dB.
95
4.5 CONCLUSION
CHAPTER 5
5.1 INTRODUCTION
user has to provide his or her personal details like ID, to the SP through
trusted AP. But these details are exposed to adversaries and become
vulnerable to eavesdropping attacks. Conversely, the SP cannot provide
service to user until the authenticity is verified through user ID.
5.3.1.3 Encryption
given by ( )-1. The computed binary CFO vectors are converted into
5 end for
6 for each frame Si do
7 j= i Mod L;
8 Si = Si || Vj;
9 end for
Output: Encrypted frame;
process is aborted. The user can refrain from proceeding with payment
process and abort the transaction by sending a denial message to server. After
successful verification of payment data, SE in USIM card responds to Cp by
generating signature SM with private key K1 by RSA algorithm and transmits
to server. At server, Kd is used to search public key K2 of the intended user to
verify signature SM. Subsequent to successful verification, server computes
payment data D1 and hash of Rn, [H(Rn)] and sends to user. User
computes H(Rn) locally and computes )] to find D1 and
displays it on user screen. Thus, the complete transaction process is
successfully completed.
All the frames from the user and webserver are transmitted/received
after encryption/decryption using key K and CFO. Though adversaries can
eavesdrop all the frames being transmitted between user and access point,
adversaries cannot decrypt the frame correctly because the key generated
108
from randomly estimated CSI and CFO by adversary cannot be identical with
the actual CSI and CFO estimated by legitimate users.
proposed hybrid method combining SPPLAS and SMAP has been ascertained
in terms of information leakage to adversary and BER comparison between
adversary and legitimate user. The performance of the existing SMAP method
and proposed hybrid method has been analyzed and compared in terms of the
transaction time for each phase and for complete transaction. From the
analysis, it is ensured that the proposed scheme serve mobile financial
transaction by ensuring the security features of privacy and authentication
while avoiding fraudulent transactions.
100
10-1
Intended User
Random Adversary
-2
10 Intelligent Adversary
10-3
BER
10-4
10-5
10-6
10-7
10-8
0 2 4 6 8 10 12 14 16 18 20
SNR (dB)
18
Registeration Phase - Proposed Method
16 Registeration Phase - Existing Method
14
12
10
0
0 100 200 300 400 500 600 700 800 900 1000
Number of Transactions
layer encryption provides security for mobile payment with user’s privacy
being preserved.
The proposed method takes only 4.77s than the existing method for
1000 transactions. It is obvious from the analysis that although the proposed
method is having additional security features of location authentication and
privacy, the transaction time is nearly same as that of existing SMAP
protocol. Hence the proposed method does not over burden the mobile
devices with computational complexity while providing additional security.
5.5 CONCLUSIONS
CHAPTER 6
CONCLUSION
The following are some of the topics related to the present research,
worthy of further studies:
REFERENCES
12. Gollakota, S & Katabi, D 2011, ‘Physical layer wireless security made
fast and channel independent’, Proceedings of IEEE INFOCOM,
Shanghai, China, pp. 1125–1133.
16. Husain, MI, Mahant, S & Sridhar, R 2012, ‘CD-PHY: Physical layer
security in wireless networks through constellation diversity’,
Proceedings of IEEE Military Communications Conference, Orlando,
FL, pp. 1-9.
20. Kang, GS, Xiaoen, J, Zhigang, C & Xin, H 2012, ‘Privacy protection
for users of location-based services’, IEEE Wireless Communications,
vol. 19, no. 1, pp. 30–39.
24. Liu Hongbo, Wang Yang, Yang Jie & Chen Yingying 2013, ‘Fast and
practical secret key extraction by exploiting channel response’,
Proceedings of IEEE INFOCOM, pp. 3048-56.
25. Liu, H, Yang, J, Wang, Y, Chen. Y & Koksal, CE 2014, ‘Group Secret
Key Generation via Received Signal Strength: Protocols, Achievable
Rates, and Implementation’, IEEE Transactions on Mobile Computing,
vol. 13, no. 12, pp. 2820-2835.
26. Liu, L, Yan, Y & Ling, C 2018, ‘Achieving secrecy capacity of the
Gaussian wiretap channel with polar lattices’, IEEE Transactions on
Information Theory, vol. 64, no. 3, pp. 1647–1665.
28. Liwei Zhang, A, Adam, D, Yunsi, F & Pei, L 2015, ‘A Unified Metric
for Quantifying Information Leakage of Cryptographic Devices Under
Power Analysis Attacks’, Proceedings of the International Conference
on the Theory and Application of Cryptology and Information
Security, pp. 338-60.
29. Longwang, C, Li, Z, Boon, CS, Wei, L, Dongtang, M & Jibo, W 2017,
‘Efficient Physical-Layer Secret Key Generation and Authentication
Schemes Based on Wireless Channel-Phase’. Mobile Information
Systems, vol. 2017, Article ID 7393526, 13 pages.
31. Mesleh, RY, Haas, H, Sinanovic, S, Ahn CW & Yun, S 2008, ‘Spatial
Modulation’, IEEE Transactions on Vehicular Technology, vol. 57,
no. 4, pp. 2228-2241.
32. Oggier, O & Hassibi, B 2011, ‘The secrecy capacity of the MIMO
wiretap channel’, IEEE Transactions on Information Theory, vol. 57,
no. 8, pp. 4961–4972.
35. Renzo, MD, Haas, H & Grant, PM 2011, ‘Spatial modulation for
multiple-antenna wireless systems: a survey’, IEEE Communications
Magazine, vol. 49, no. 12, pp. 182-191.
38. Siva Kumar Reddy, B & Lakshmi, B 2015, ‘Adaptive modulation and
coding with channel state information in OFDM for WiMAX’,
International Journal of Image Graphics and Signal Processing, vol. 1,
pp. 61–69.
39. Sriram, NP, Suman, J, Prarthana, LG, Mike, C, Sneha, KK, Neal, P &
Srikanth, VK 2013, ‘Secret key extraction from wireless signal
strength in real environments’, IEEE Transactions on Mobile
Computing, vol. 12, no. 5, pp. 917–30.
43. Treust, ML, Szczecinski, L & Labeau, F 2013, ‘Secrecy & Rate
Adaptation for secure HARQ protocols’, IEEE Information Theory
Workshop (ITW), Sevilla, Spain, pp. 1-5
46. Wen, M, Zheng, B, Kim, KJ, Renzo, MD, Tsiftsis, T, Chen, KC &
Dhahir, N 2019, ‘A Survey on Spatial Modulation in Emerging
Wireless Systems: Research Progresses and Applications’, IEEE
Journal on Selected Areas in Communications, vol. 37, no. 9,
pp. 1949-1972.
127
47. Wyner, A. D 1975, ‘The wire-tap channel’, The Bell System Technical
Journal, vol. 54, no. 8, pp. 1355–1387.
LIST OF PUBLICATION
International Journal