-
Intelligent Reflecting Surface Assisted Secret Key Generation Under Spatially Correlated Channels in Quasi-Static Environments
Authors:
Vahid Shahiri,
Hamid Behroozi,
Ali Kuhestani
Abstract:
Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means t…
▽ More
Physical layer key generation (PLKG) can significantly enhance the security of classic encryption schemes by enabling them to change their secret keys significantly faster and more efficient. However, due to the reliance of PLKG techniques on channel medium, reaching a high secret key rate is challenging in static environments. Recently, exploiting intelligent reflecting surface (IRS) as a means to induce randomness in static wireless channels has received significant research interest. However, the impact of spatial correlation between the IRS elements is rarely studied. To be specific, for the first time, in this contribution, we take into account a spatially correlated IRS which intends to enhance the secret key generation (SKG) rate in a static medium. Closed form analytical expressions for SKG rate are derived for the two cases of random phase shift and equal random phase shift for all the IRS elements. We also analyze the temporal correlation between the channel samples to ensure the randomness of the generated secret key sequence. We further formulate an optimization problem in which we determine the optimal portion of time within a coherence interval dedicated for the direct and indirect channel estimation. We show the accuracy and the fast convergence of our proposed sequential convex programming (SCP) based algorithm and discuss the various parameters affecting spatially correlated IRS assisted PLKG.
△ Less
Submitted 3 December, 2022;
originally announced December 2022.
-
Joint Information Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
Authors:
Moslem Forouzesh,
Paeiz Azmi,
Ali Kuhestani,
Phee Lep Yeoh
Abstract:
In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. S…
▽ More
In this paper, we investigate joint information theoretic secrecy and covert communication in a single-input multi-output (SIMO) system where a transmitter (Alice) is communicating with two legitimate users (Bob and Carol). We consider that an untrusted user and a warden node are also present in the network attempting to attack the secure and covert communications to Bob and Carol, respectively. Specifically, Bob requires secure communications such that his messages from Alice are not decoded by the untrusted user, while Carol requires covert communications such that her messages from Alice are not detected by the warden.
To do so, we consider that Alice transmits Carol's messages during selected time slots to hide them from the warden while also transmitting Bob's messages in each time slot contentiously.
We formulate an optimization problem with the aim of maximizing the average rate subject to a covert communication requirement and a secure communications constraint.
Since the proposed optimization problem is non-convex, we utilize successive convex approximation to obtain a tractable solution. We consider practical assumptions that Alice has imperfect knowledge of the warden's location and imperfect channel state information (CSI) of Bob and Carol.
Our numerical examples highlight that the imperfect CSI at Carol has a more detrimental impact on the average rate compared to imperfect CSI at Bob.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
Can a Multi-Hop Link Relying on Untrusted Amplify-and-Forward Relays Render Security?
Authors:
Milad Tatar Mamaghani,
Ali Kuhestani,
Hamid Behroozi
Abstract:
Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relayin…
▽ More
Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things (IoT). However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario where the relays are both necessary helpers and potential adversary. To obviate this issue, a new cooperative jamming scheme is proposed in this paper, in which the data can be confidentially communicated from the source to the destination through multiple untrusted relays. In our proposed secure transmission scheme, all the legitimate nodes contribute to providing secure communication by intelligently injecting artificial noises to the network in different communication phases. For the sake of analysis, we consider a multi-hop untrusted relaying network with two successive intermediate nodes, i.e, a three-hop communications network. Given this system model, a new closed-form expression is presented in the high signal-to-noise ratio (SNR) region for the Ergodic secrecy rate (ESR). Furthermore, we evaluate the high SNR slope and power offset of the ESR to gain an insightful comparison of the proposed secure transmission scheme and the state-of-arts. Our numerical results highlight that the proposed secure transmission scheme provides better secrecy rate performance compared with the two-hop untrusted relaying as well as the direct transmission schemes.
△ Less
Submitted 5 July, 2020; v1 submitted 17 May, 2019;
originally announced May 2019.
-
Covert Transmission with Antenna Selection and Using an External Jammer
Authors:
Morteza Sarkheil,
Paeiz Azmi,
Moslem Forouzesh,
Ali Kuhestani
Abstract:
This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the j…
▽ More
This paper adopts the antenna selection technique to enhance the covert rate in a wireless communication network comprised of a source, a destination , an external jammer and an eavesdropper. In the covert communication, the level of transmit power is low and hence a source with multiple antennas can be adopted to send the information toward the single antenna destination while concurrently, the jammer transmits an artificial noise signal. For this system model, we consider a scenario where the source is forced to select one or several of its antennas to transmit its confidential information due to its limited RF chains. Furthermore, we consider two different jamming scenarios to support our covert communication: 1) The destination is unable to cancel the jamming signal, 2) The destination can subtract the jamming signal. For such a communication network, our aim is to maximize the covert rate subject to power constraint and covert communication requirement. In the first scenario, the optimization problem is non-convex, and hence, it can be solved through using Difference of Convex function (DC) method while the optimization problem of the second scenario is intrinsically convex. Our numerical results show that the higher the number of selected antennas at the transmitter, the higher the covert rate will be achieved.
△ Less
Submitted 26 December, 2018;
originally announced December 2018.