On the Application of Key-Based Physical Layer Security in 5G Heterogeneous Networks

Concern for 5G security is driving interest in additional methods capable of exchanging secure information. This paper introduces a scheme for extending 5G with Physical Layer Security, an emerging Open Systems Interconnect Layer-1 security area that achieves perfect secrecy data transmission. The foundations for a Stochastic Geometry approach to Key based Physical Layer Security are established for 5G Heterogeneous Networks. This work also introduces realistic Time Division Duplex algorithms integrated with 5G-OFDM reference signals that enable the exchange of shared, private information. The resulting Physical Layer Security protocols map random secret key bits to precoders in a codebook through a Precoder Matrix Index. Analysis is presented for Key Bit Error rates under realistic stochastic geometry frameworks in MIMO Rayleigh fading, under various base station densities, interference profiles, and configurations. A Key Bit Error Rate of 1% and 3% for both 1 and 2 bit code books is achieved with a network base station density of 0.01 km−2 and 0.1 km−2respectively. The proffered Layer-1 protocols, which operate independently of existing higher layer network and transport layer security, can lead to significantly improved 5G security.

[1]  François Baccelli,et al.  Stochastic Geometry and Wireless Networks, Volume 2: Applications , 2009, Found. Trends Netw..

[2]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[3]  Anil Kumar Yerrapragada,et al.  On the Application of MIMO Space-Time Coding to Physical Layer Security in sub-6 GHz 5G , 2019, 2019 14th Annual Conference System of Systems Engineering (SoSE).

[4]  Xiangyun Zhou,et al.  Physical Layer Security in Cellular Networks: A Stochastic Geometry Approach , 2013, IEEE Transactions on Wireless Communications.

[5]  Chen-Mou Cheng,et al.  MIMO-OFDM PHY Integrated (MOPI) Scheme for Confidential Wireless Transmission , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[6]  Muhammad Ali Imran,et al.  5G Backhaul Challenges and Emerging Research Directions: A Survey , 2016, IEEE Access.

[7]  Emad Alsusa,et al.  Secret Key Exchange Using Private Random Precoding in MIMO FDD and TDD Systems , 2017, IEEE Transactions on Vehicular Technology.

[8]  Alexander V. Uskov Information security of mobile VPN: Conceptual models and design methodology , 2012, 2012 IEEE International Conference on Electro/Information Technology.

[9]  Irena Šeremet,et al.  Benefits of using 5G Network Slicing to implement Vehicle-to-Everything (V2X) technology , 2019, 2019 18th International Symposium INFOTEH-JAHORINA (INFOTEH).

[10]  Alexander Afanasyev,et al.  On the role of routing in named data networking , 2014, ICN '14.

[11]  Oriol Sallent,et al.  Management of Network Slicing in 5G Radio Access Networks: Functional Framework and Information Models , 2018, ArXiv.

[12]  Huiming Wang,et al.  Physical Layer Security in Millimeter Wave Cellular Networks , 2016, IEEE Transactions on Wireless Communications.

[13]  Huaiyu Dai,et al.  A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions , 2017, IEEE Communications Surveys & Tutorials.

[14]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[15]  Haji M. Furqan,et al.  Secret key generation using channel quantization with SVD for reciprocal MIMO channels , 2016, 2016 International Symposium on Wireless Communication Systems (ISWCS).

[16]  Chen-Mou Cheng,et al.  Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices , 2013, IEEE Journal on Selected Areas in Communications.

[17]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[18]  Kai Hwang,et al.  Collaborative Internet worm containment , 2005, IEEE Security & Privacy Magazine.

[19]  Jeffrey G. Andrews,et al.  Physical Layer Security in Downlink Multi-Antenna Cellular Networks , 2013, IEEE Transactions on Communications.

[20]  Anil Kumar Yerrapragada,et al.  Error Rate Analysis of Physical Layer Security for Sub-6 GHz 5G Network Planning , 2019, 2019 14th Annual Conference System of Systems Engineering (SoSE).

[21]  George K. Karagiannidis,et al.  Physical Layer Security in the Presence of Interference , 2017, IEEE Wireless Communications Letters.