Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications

Next-generation systems aim to increase both the speed and responsiveness of wireless communications, while supporting compelling applications such as edge/cloud computing, remote-Health, vehicle-to-infrastructure communications, etc. As these applications are expected to carry confidential personal data, ensuring user privacy becomes a critical issue. In contrast to traditional security and privacy designs that aim to prevent confidential information from being eavesdropped upon by adversaries, or learned by unauthorized parties, in this paper we consider designs that mask the users’ identities during communication, hence resulting in anonymous communications. In particular, we examine the recent interest in physical layer (PHY) anonymous solutions. This line of research departs from conventional higher layer anonymous authentication/encryption and routing protocols, and judiciously manipulates the signaling pattern of transmitted signals in order to mask the senders’ PHY characteristics. We first discuss the concept of anonymity at the PHY, and illustrate a strategy that is able to unmask the sender’s identity by analyzing his/her PHY information only, i.e., signalling patterns and the inherent fading characteristics. Subsequently, we overview the emerging area of anonymous precoding to preserve the sender’s anonymity, while ensuring high receiver-side signal-to-interference-plus-noise ratio (SINR) for communication. This family of anonymous precoding designs represents a new approach to providing anonymity at the PHY, introducing a new dimension for privacy-preserving techniques.

[1]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[2]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[3]  Kazuya Sakai,et al.  On Anonymous Routing in Delay Tolerant Networks , 2019, IEEE Transactions on Mobile Computing.

[4]  Sagar Naik,et al.  An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks , 2007, IEEE Journal on Selected Areas in Communications.

[5]  Christos Masouros,et al.  Interference Exploitation Precoding Made Practical: Optimal Closed-Form Solutions for PSK Modulations , 2018, IEEE Transactions on Wireless Communications.

[6]  H. Vincent Poor,et al.  An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications , 2021, IEEE Journal on Selected Areas in Information Theory.

[7]  Erik Blasch,et al.  RFAL: Adversarial Learning for RF Transmitter Identification and Classification , 2020, IEEE Transactions on Cognitive Communications and Networking.

[8]  Christos Masouros,et al.  Multi-Cell Interference Exploitation: Enhancing the Power Efficiency in Cell Coordination , 2020, IEEE Transactions on Wireless Communications.

[9]  H. Vincent Poor,et al.  Secrecy by Design With Applications to Privacy and Compression , 2021, IEEE Transactions on Information Theory.

[10]  K. Emura,et al.  Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation , 2016, IEEE Transactions on Emerging Topics in Computing.

[11]  Christos Masouros,et al.  Fundamentals of Physical Layer Anonymous Communications: Sender Detection and Anonymous Precoding , 2020, IEEE Transactions on Wireless Communications.

[12]  Tharmalingam Ratnarajah,et al.  Known interference in the cellular downlink: a performance limiting factor or a source of green signal power? , 2013, IEEE Communications Magazine.

[13]  Yuguang Fang,et al.  Lightweight Anonymous Authentication Protocols for RFID Systems , 2017, IEEE/ACM Transactions on Networking.

[14]  Physical Layer Anonymous Communications , 2020, 2020 IEEE Globecom Workshops (GC Wkshps.