Authenticated Data Transmission Using Analog Function Computation

Conventional analog function computation (AFC) is an effective data aggregation technique that combines communication and computation to improve time efficiency and scalability. In this letter, different from the conventional AFC, we study distinguishing individual observations from the aggregated data by including unique prime identifiers to pre-processing functions. Prime identifiers can be used to equip the network with a simple authentication mechanism while removing the dependency on public key algorithms or trusted third parties. The resilience of the proposed scheme to spoofing attacks and non-ideal conditions including the channel estimation errors and the thermal noise is investigated with computer simulations.

[1]  Jean-Paul M. G. Linnartz,et al.  Controlled equalization of multi-carrier CDMA in an indoor Rician fading channel , 1994, Proceedings of IEEE Vehicular Technology Conference (VTC).

[2]  Andrea Conti,et al.  Adaptive TORC detection for MC-CDMA wireless systems , 2009, IEEE Transactions on Communications.

[3]  Björn E. Ottersten,et al.  Collaborative-Relay Beamforming With Perfect CSI: Optimum and Distributed Implementation , 2009, IEEE Signal Processing Letters.

[4]  Guo Wei,et al.  Over-the-air Computation for IoT Networks: Computing Multiple Functions with Antenna Arrays , 2018 .

[5]  Kaibin Huang,et al.  MIMO Over-the-Air Computation for High-Mobility Multimodal Sensing , 2018, IEEE Internet of Things Journal.

[6]  Shuangfeng Han,et al.  Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends , 2015, IEEE Communications Magazine.

[7]  Slawomir Stanczak,et al.  Robust Analog Function Computation via Wireless Multiple-Access Channels , 2012, IEEE Transactions on Communications.

[8]  Shancang Li,et al.  5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..

[9]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[10]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[11]  Periklis Chatzimisios,et al.  Energy-Efficient Over-the-Air Computation Scheme for Densely Deployed IoT Networks , 2020, IEEE Transactions on Industrial Informatics.

[12]  Weiming Shen,et al.  An IoT-Based Online Monitoring System for Continuous Steel Casting , 2016, IEEE Internet of Things Journal.

[13]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[14]  Moe Z. Win,et al.  Distributed Network Secrecy , 2013, IEEE Journal on Selected Areas in Communications.

[15]  Andrea Conti,et al.  On the down-link performance of multi-carrier CDMA systems with partial equalization , 2007, IEEE Transactions on Wireless Communications.

[16]  Slawomir Stanczak,et al.  On Function Computation via Wireless Sensor Multiple-Access Channels , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[17]  Slawomir Stanczak,et al.  Reliable computation of nomographic functions over Gaussian multiple-access channels , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[18]  Kaibin Huang,et al.  Wirelessly Powered Data Aggregation for IoT via Over-the-Air Function Computation: Beamforming and Power Control , 2018, IEEE Transactions on Wireless Communications.

[19]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .