Performance analysis of the encryption method based on compressed sensing at the physical layer

The simple structure of compressed sensing (CS) lead to low complexity encryption, which is fascinating for nodes with limited resources in the wireless network. In this paper, we analyze the performance of the encryption method based on compressed sensing, and prove that the encryption can achieve the information theory security. The effect of the sparsity and the signal noise ratio (SNR) on the encryption method are explored. The security and robustness of the encryption method are analyzed by a passive eavesdropper and an active attacker. Under the Rayleigh fading channels, simulation results show that the security performance of the encryption increases as the sparsity decreases, and the SNR increases. In addition, the encryption approach is valid in preventing access from an active attacker based on the computation attack, which is consistent with the theory analysis.

[1]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[2]  Emmanuel J. Candès,et al.  Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.

[3]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[4]  Gill R. Tsouri,et al.  Establishing secure measurement matrix for compressed sensing using wireless physical layer security , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[5]  Wang Hong,et al.  Industrial wireless communication protocol WIA-PA and its interoperation with Foundation Fieldbus , 2010, 2010 International Conference On Computer Design and Applications.

[6]  Babak Seyfe,et al.  Perfect Secrecy Using Compressed Sensing , 2010, ArXiv.

[7]  Qinye Yin,et al.  Secret key generation from multiple cooperative helpers by rate unlimited public communication , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[8]  Kyung Sup Kwak,et al.  An overview of IEEE 802.15.6 standard , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).

[9]  Jie Yang,et al.  Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[10]  Sriram Vishwanath,et al.  Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.

[11]  Jingjing Huang,et al.  Dynamic secret key generation exploiting Ultra-wideband wireless channel characteristics , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[12]  Riccardo Rovatti,et al.  Submitted to Ieee Transactions on Signal Processing Low-complexity Multiclass Encryption by Compressed Sensing Part I: Definition and Main Properties , 2022 .

[13]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[14]  Marco Chiani,et al.  Secret key extraction from a UWB channel: Analysis in a real environment , 2014, 2014 IEEE International Conference on Ultra-WideBand (ICUWB).

[15]  Y. Rachlin,et al.  The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[16]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.