SDR Proof-of-Concept of Full-Duplex Jamming for Enhanced Physical Layer Security

In order to secure wireless communications, we consider the usage of physical-layer security (PLS) mechanisms (i.e., coding for secrecy mechanisms) combined with self-interference generation. We present a prototype implementation of a scrambled coding for secrecy mechanisms with interference generation by the legitimate receiver and the cancellation of the effect of self-interference (SI). Regarding the SI cancellation, four state-of-the-art algorithms were considered: Least mean square (LMS), normalized least mean square (NLMS), recursive least squares (RLS) and QR decomposition recursive least squares (QRDRLS). The prototype implementation is performed in real-world software-defined radio (SDR) devices using GNU-Radio, showing that the LMS outperforms all other algorithms considered (NLMS, RLS and QRDRLS), being the best choice to use in this situation (SI cancellation). It was also shown that it is possible to secure communication using only noise generation by the legitimate receiver, though a variation of the packet loss rate (PLR) and the bit error rate (BER) gaps is observed when moving from the fairest to an advantageous or a disadvantageous scenario. Finally, when noise generation was combined with the adapted scrambled coding for secrecy with a hidden key scheme, a noteworthy security improvement was observed resulting in an increased BER for Eve with minor interference to Bob.

[1]  Paulo S. R. Diniz,et al.  Adaptive Filtering: Algorithms and Practical Implementation , 1997 .

[2]  Marco Baldi,et al.  Coding With Scrambling, Concatenation, and HARQ for the AWGN Wire-Tap Channel: A Security Gap Analysis , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[4]  Ahmad Y. Javaid,et al.  Link-Signature-Based Discriminatory Channel Estimation (LS-DCE) for Physical Layer Security in Stationary and Mobile OFDM Transceivers , 2020, IEEE Transactions on Vehicular Technology.

[5]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Andrew Thangaraj,et al.  Error-Control Coding for Physical-Layer Secrecy , 2015, Proceedings of the IEEE.

[7]  Alan Tennant,et al.  Multichannel Dynamic Directional Modulation with Software Defined Radio , 2020, 2020 14th European Conference on Antennas and Propagation (EuCAP).

[8]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[9]  Willie K. Harrison,et al.  Generating a Binary Symmetric Channel for Wiretap Codes , 2019, IEEE Transactions on Information Forensics and Security.

[10]  Marco Gomes,et al.  Interleaved Concatenated Coding for Secrecy in the Finite Blocklength Regime , 2016, IEEE Signal Processing Letters.

[11]  Telmo R. Fernandes,et al.  Testbed Implementation and Evaluation of Interleaved and Scrambled Coding for Physical-Layer Security , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[12]  Byung-Jae Kwak,et al.  LDPC Codes for the Gaussian Wiretap Channel , 2009, IEEE Transactions on Information Forensics and Security.

[13]  Dushantha Nalin K. Jayakody,et al.  A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.

[14]  Georg Fischer,et al.  Enabling Fake Base Station Detection through Sample-based Higher Order Noise Statistics , 2019, 2019 42nd International Conference on Telecommunications and Signal Processing (TSP).

[15]  Berna Özbek,et al.  Key Error Rates in Physical Layer Key Generation: Theoretical Analysis and Measurement-Based Verification , 2017, IEEE Wireless Communications Letters.

[16]  Alexandre J. Pierrot,et al.  Experimental aspects of secret key generation in indoor wireless environments , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[17]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[18]  Willie K. Harrison,et al.  SDR Testbed of Full-Duplex Jamming for Secrecy , 2020, 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP).

[19]  Matthieu R. Bloch,et al.  Coding for Secrecy: An Overview of Error-Control Coding Techniques for Physical-Layer Security , 2013, IEEE Signal Processing Magazine.

[20]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[21]  Dong Wang,et al.  Enhancing Information Security via Physical Layer Approaches in Heterogeneous IoT With Multiple Access Mobile Edge Computing in Smart City , 2019, IEEE Access.

[22]  Navninderjit Singh,et al.  LoRa PHY Range Tests and Software Decoding - Physical Layer Security , 2019, 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN).

[23]  Monson H. Hayes,et al.  Statistical Digital Signal Processing and Modeling , 1996 .

[24]  Björn E. Ottersten,et al.  Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.

[25]  Athanasios V. Vasilakos,et al.  Full-Duplex Wireless Communications: Challenges, Solutions, and Future Research Directions , 2016, Proceedings of the IEEE.

[26]  Roman Marsálek,et al.  Wireless device classification through transmitter imperfections — Evaluation of performance degradation due to the chip heating , 2017, 2017 IEEE Radio and Wireless Symposium (RWS).

[27]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[28]  Marco Gomes,et al.  Interleaved Coding for Secrecy with a Hidden Key , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[29]  Dong Wang,et al.  A Survey of Optimization Approaches for Wireless Physical Layer Security , 2019, IEEE Communications Surveys & Tutorials.

[30]  Ender Tekin,et al.  The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming , 2007, IEEE Transactions on Information Theory.

[31]  Steve Rogers,et al.  Adaptive Filter Theory , 1996 .

[32]  Willie K. Harrison,et al.  Full-Duplex Jamming for Enhanced Hidden-Key Secrecy , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[33]  Marco Gomes,et al.  Adaptive Physical-Layer Security Through Punctured Coding for Secrecy , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[34]  Ahmad Y. Javaid,et al.  Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS) , 2019, 2019 Wireless Telecommunications Symposium (WTS).

[35]  Matthieu R. Bloch,et al.  Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.