Asymmetric Physical Layer Encryption Over Stationary Time Selective Wireless Communication Channel


Authors : Khalid Hamdnaalla; AEbtihal Haider Gismalla Yousif; Rashid Saeed; Abdullah Khalil Mansour

Volume/Issue : Volume 10 - 2025, Issue 1 - January


Google Scholar : https://tinyurl.com/yc3a96kk

Scribd : https://tinyurl.com/4sampnze

DOI : https://doi.org/10.5281/zenodo.14769336


Abstract : This paper proposes an asymmetric physical layer security scheme APLE based on Elliptic curve Diffie Helman (ECDH), channel state information (CSI), and stream cipher to achieve user authenticity, key agreement and confidentiality. Moreover, this work utilizes the most promising wireless communication model and multiple access combination. Multi- Input-Multi-Output (MIMO), and Orthogonal Frequency Division Multiplexing (OFDM) respectively. Unlike other relent schemes this paper considers stationary time selective Rayleigh fading channel. The proposed authentication protocol has been proven. PLE consists of stages; Modulation Encryptor and Crypto Filters based on minimal correlation coefficient have been proposed. The function of the Modulation Encryptor is to provide confusion. However, the function Crypto-Filter provides the diffusion. The proposed PLE scheme has been designed to work with modulation schemes with signal space greater than four. The proposed PLE is simulated based on QPSK and 16QAM, and some numerical results have been drowned. symbol error rate SER as function of signal to noise ration SNR with correlation coefficient have been used to measure security strength. Besides SER and peak signal to noise ratio PSNR used to evaluate the system reliability. The results show this scheme has strong security (SER at eavesdropper rich ninety five percent with correlation coefficient almost zero), and excellent reliability (same performance as no encryption).

Keywords : ECDH; CSI; Stream Cipher; PLE; OFDM; MIMO.

References :

  1. Al Mtawa, Yaser, et al. "Smart home networks: Security perspective and ml-based ddos detection." 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2020.
  2. Li, Wei, et al. "Asymmetric physical layer encryption for wireless communications." IEEE Access 7 (2019): 46959-46967.
  3. Stallings, William. Network security essentials: applications and standards. Pearson, 2016.
  4. Pecorella, Tommaso, Luca Brilli, and Lorenzo Mucchi. "The role of physical layer security in IoT: A novel perspective." Information 7.3 (2016): 49.
  5. Shannon, Claude E. "Communication theory of secrecy systems." The Bell system technical journal 28.4 (1949): 656-715.
  6. Zhou, Xiangyun, Lingyang Song, and Yan Zhang, eds. Physical layer security in wireless communications. Crc Press, 2013.
  7. Mucchi, Lorenzo, et al. "Physical-layer security in 6G networks." IEEE Open Journal of the Communications Society 2 (2021): 1901-1914.
  8. Li, Wei, et al. "Mathematical model and framework of physical layer encryption for wireless communications." 2018 IEEE Globecom Workshops (GC Wkshps). IEEE, 2018.
  9. Huo, Fei, and Guang Gong. "XOR encryption versus phase encryption, an in-depth analysis." IEEE Transactions on Electromagnetic Compatibility 57.4 (2015): 903-911.
  10. J. Zhang, A. Marshall, R. Woods, and T. Q. Duong, “Design of an ofdm physical layer encryption scheme,” IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2114–2127, 2017.
  11. J. Zhang, A. Marshall, R. Woods, and T. Q. Duong, “Design of an ofdm physical layer encryption scheme,” IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2114–2127, 2017.
  12. M. Sakai, H. Lin, and K. Yamashita, “Intrinsic interference based physical layer encryption for ofdm/oqam,” IEEE Communications Letters, vol. 21, no. 5, pp. 1059–1062, 2017.
  13. T. R. Dean and A. J. Goldsmith, “Physical-layer cryptography through massive mimo,” IEEE Transactions on Information Theory, vol. 63, no. 8, pp. 5419–5436, 2017.
  14. B. Chen, C. Zhu, W. Li, J. Wei, V. C. M. Leung, and L. T. Yang, “Original symbol phase rotated secure transmission against powerful massive mimo eavesdropper,” IEEE Access, vol. 4, pp.3016–3025, 2016.
  15. K. Nain, J. Bandaru, M. A. Zubair, and R. Pachamuthu, “A secure phase-encrypted ieee 802.15.4 transceiver design,” IEEE Transactions on Computers, vol. 66, no. 8, pp. 1421–1427, 2017.
  16. K. Lai, J. Lei, L. Wen, G. Chen, W. Li, and P. Xiao, ``Secure transmission with randomized constellation rotation for downlink sparse code multiple access system,'' IEEE Access, vol. 6, pp. 5049_5063, 2018.
  17. Melki, Reem, et al. "An efficient OFDM-based encryption scheme using a dynamic key approach." IEEE Internet of Things Journal 6.1 (2018): 361-378.
  18. Sahin, B. Katz, and K. Dandekar, “Secure and robust symmetric key generation using physical layer techniques under various wireless environments,” in Proc. IEEE Radio and Wireless Sympos. (RWS). Austin, TX, USA: IEEE, Jan. 2016, pp. 211–214.
  19. H. Liu, Y. Wang, J. Yang, and Y. Chen, “Fast and practical secret key extraction by exploiting channel response,” in Proc. IEEE Int. Conf. Computer Commun. (INFOCOM), Turin, Italy, Apr. 2013, pp. 3048–3056.
  20. Y. Al-Moliki, M. Alresheedi, and Y. Al-Harthi, “Robust key generation from optical OFDM signal in indoor VLC networks,” IEEE Photon. Technol. Lett., vol. 28, no. 22, pp. 2629–2632, Nov. 2016.
  21. R. Horstmeyer, B. Judkewitz, I. Vellekoop, S. Assawaworrarit, and C. Yang, “Physical key-protected one time pad,” Jun. 2015, US Patent 9,054,871.
  22. S. Gollakota and D. Katabi, “Physical layer wireless security made fast and channel independent,” in Proc. IEEE Int. Conf. Computer Commun. (INFOCOM), Shanghai, China, Apr. 2011, pp. 1125–1133.
  23. Mazin, K. Davaslioglu, and R. Gitlin, “Secure key management for 5G physical layer security,” in Proc. IEEE Wireless and Microw. Technol.
  24. Yu, Daizhong, et al. "Physical Layer Security in Spherical-Wave Channel Using Massive MIMO." 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, 2022.
  25. Zhao, Hong, et al. "A physical-layer key generation approach based on received signal strength in smart homes." IEEE Internet of Things Journal 9.7 (2021): 4917-4927.
  26. Melki, Reem, Hassan N. Noura, and Ali Chehab. "Lightweight and secure D2D authentication & key management based on PLS." 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall). IEEE, 2019.
  27. Pirayesh, Jamshid, et al. "A PLS-HECC-based device authentication and key agreement scheme for smart home networks." Computer Networks 216 (2022): 109077.
  28. Ngo, Hoang Anh, and Lajos Hanzo. "Hybrid automatic-repeat-request systems for cooperative wireless communications." IEEE Communications Surveys & Tutorials 16.1 (2013): 25-45.
  29. Paar, Christof, and Jan Pelzl. Understanding cryptography. Vol. 1. Springer-Verlag Berlin Heidelberg, 2010.
  30. Fips Pub 186-4 Federal Information Processing Standards Publication Digital Signature Standard (DSS), Standard FIPS PUB 186-4, National Institute of Standards and Technology Standard, Jul. 2013. [Online]. Available:https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf.
  31. Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied cryptography. CRC press, 2018.
  32. Pearson, Karl. "VII. Mathematical contributions to the theory of evolution. —III. Regression, heredity, and panmixia." Philosophical Transactions of the Royal Society of London. Series A, containing papers of a mathematical or physical character 187 (1896): 253-318.
  33. Ludeman, Lonnie C. Random processes: filtering, estimation, and detection. John Wiley & Sons, Inc., 2003.
  34. Cohen, Jacob. Statistical power analysis for the behavioral sciences. routledge, 2013.
  35. Bovik, Alan C. Handbook of image and video processing. Academic press, 2010.

This paper proposes an asymmetric physical layer security scheme APLE based on Elliptic curve Diffie Helman (ECDH), channel state information (CSI), and stream cipher to achieve user authenticity, key agreement and confidentiality. Moreover, this work utilizes the most promising wireless communication model and multiple access combination. Multi- Input-Multi-Output (MIMO), and Orthogonal Frequency Division Multiplexing (OFDM) respectively. Unlike other relent schemes this paper considers stationary time selective Rayleigh fading channel. The proposed authentication protocol has been proven. PLE consists of stages; Modulation Encryptor and Crypto Filters based on minimal correlation coefficient have been proposed. The function of the Modulation Encryptor is to provide confusion. However, the function Crypto-Filter provides the diffusion. The proposed PLE scheme has been designed to work with modulation schemes with signal space greater than four. The proposed PLE is simulated based on QPSK and 16QAM, and some numerical results have been drowned. symbol error rate SER as function of signal to noise ration SNR with correlation coefficient have been used to measure security strength. Besides SER and peak signal to noise ratio PSNR used to evaluate the system reliability. The results show this scheme has strong security (SER at eavesdropper rich ninety five percent with correlation coefficient almost zero), and excellent reliability (same performance as no encryption).

Keywords : ECDH; CSI; Stream Cipher; PLE; OFDM; MIMO.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe