Asymmetric Physical Layer Encryption for Wireless Communications

In this paper, we establish a cryptographic primitive for wireless communications. An asymmetric physical layer encryption (PLE) scheme based on elliptic curve cryptography is proposed. Compared with the conventional symmetric PLE, asymmetric PLE avoids the need of key distribution on a private channel, and it has more tools available for processing complex-domain signals to confuse possible eavesdroppers when compared with upper-layer public key encryption. We use quantized information entropy to measure the constellation confusion degree. The numerical results show that the proposed scheme provides greater confusion to eavesdroppers and yet does not affect the bit error rate (BER) of the intended receiver (the information entropy of the constellation increases to 17.5 for 9-bit quantization length). The scheme also has low latency and complexity [<inline-formula> <tex-math notation="LaTeX">$O(N^{2.37}) $ </tex-math></inline-formula>, where <inline-formula> <tex-math notation="LaTeX">$N $ </tex-math></inline-formula> is a fixed block size], which is particularly attractive for implementation.

[1]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[2]  Li Zhou,et al.  Increasing secret key capacity of OFDM systems: a geometric program approach , 2017, Concurr. Comput. Pract. Exp..

[3]  Victor C. M. Leung,et al.  Original Symbol Phase Rotated Secure Transmission Against Powerful Massive MIMO Eavesdropper , 2016, IEEE Access.

[4]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[5]  Alfred Menezes,et al.  Elliptic Curves and Cryptography , 1999 .

[6]  Junqing Zhang,et al.  Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.

[7]  François Le Gall,et al.  Powers of tensors and fast matrix multiplication , 2014, ISSAC.

[8]  Gaojie Chen,et al.  Secure Transmission With Randomized Constellation Rotation for Downlink Sparse Code Multiple Access System , 2018, IEEE Access.

[9]  Xu Liu,et al.  Moving window scheme for extracting secret keys in stationary environments , 2016, IET Commun..

[10]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[11]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[12]  Mounir Ghogho,et al.  Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis , 2012, IEEE Communications Letters.

[13]  Jing Lei,et al.  Physical-layer encryption in massive MIMO systems with spatial modulation , 2018, China Communications.

[14]  Hai Lin,et al.  Intrinsic Interference Based Physical Layer Encryption for OFDM/OQAM , 2017, IEEE Communications Letters.

[15]  Mounir Ghogho,et al.  Physical layer security by robust masked beamforming and protected zone optimisation , 2014, IET Commun..

[16]  Ajay Kumar Nain,et al.  A Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design , 2017, IEEE Transactions on Computers.

[17]  Junqing Zhang,et al.  Efficient Key Generation by Exploiting Randomness From Channel Responses of Individual OFDM Subcarriers , 2016, IEEE Transactions on Communications.

[18]  Mounir Ghogho,et al.  Mathematical Model and Framework of Physical Layer Encryption for Wireless Communications , 2018, 2018 IEEE Globecom Workshops (GC Wkshps).

[19]  Nicolas Boullis,et al.  Some optimizations of hardware multiplication by constant matrices , 2003, Proceedings 2003 16th IEEE Symposium on Computer Arithmetic.

[20]  Mounir Ghogho,et al.  Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region , 2014, IET Commun..

[21]  Mounir Ghogho,et al.  Physical layer security of MIMO frequency selective channels by beamforming and noise generation , 2011, 2011 19th European Signal Processing Conference.

[22]  Chin-Chen Chang,et al.  An ElGamal-Like Cryptosystem for Enciphering Large Messages , 2002, IEEE Trans. Knowl. Data Eng..

[23]  Ying Huang,et al.  Concatenated physical layer encryption scheme based on rateless codes , 2018, IET Commun..

[24]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[25]  Li Sun,et al.  Encryption Over the Air: Securing Two-Way Untrusted Relaying Systems Through Constellation Overlapping , 2018, IEEE Transactions on Wireless Communications.

[26]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[27]  Edward David Moreno,et al.  Asymmetric Encryption in Wireless Sensor Networks , 2012 .

[28]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.