Multi-cell, Multi-user, and Multi-carrier Secure Communication Using Non-Orthogonal Signals' Superposition with Dual-Transmission for IoT in 6G and Beyond (original) (raw)

Single-Cell and Multi-Cell Secure Communication using NonOrthogonal Signals Superposition with Dual Transmission for IoT in Next Generation Communication Networks

2021

The patent can be used in multiple sectors, including but not limited to transportation and power distribution networks, banking and financial services, mobile telemedicine, telework applications, and industrial control and monitoring systems. Any service provider company that adopts this invention will become the pioneer in providing mobile service providers worldwide with physical layer security as a service (PSaaS). Consumers can be compensated with extra money for being supplied with highly protected networks that are impossible to hack or crack. As a network provider, this invention will support network service providers and mobile operators, who aim to increase their brand awareness and value by supplying consumers with a new service to protect their essential wireless applications unconditionally. The invention can be used worldwide, and international companies from Huawei to Samsung and all top network service providers in Turkey such as Turk Telekom, Vodafone, Turkcell will be interested in acquiring this invention.

Low complexity physical layer security approach for 5G internet of things

International Journal of Electrical and Computer Engineering (IJECE)

Fifth-generation (5G) massive machine-type communication (mMTC) is expected to support the cellular adaptation of internet of things (IoT) applications for massive connectivity. Due to the massive access nature, IoT is prone to high interception probability and the use of conventional cryptographic techniques in these scenarios is not practical considering the limited computational capabilities of the IoT devices and their power budget. This calls for a lightweight physical layer security scheme which will provide security without much computational overhead and/or strengthen the existing security measures. Here a shift based physical layer security approach is proposed which will provide a low complexity security without much changes in baseline orthogonal frequency division multiple access (OFDMA) architecture as per the low power requirements of IoT by systematically rearranging the subcarriers. While the scheme is compatible with most fast Fourier transform (FFT) based waveform ...

Securing Uplink Transmission for Lightweight Single-Antenna UEs in the Presence of a Massive MIMO Eavesdropper

With the coming of the Internet of Things (IoT) and the fifth generation (5G) wireless communication era, more and more lightweight user equipments (UEs) appear in our life. The private information they gather and transmit on the uplink will likely face security risks, since the lightweight UEs are probably with limited number of antennas, e.g., only one antenna, limited power and low signal processing and data computing capabilities, which may inherently weaken the corresponding secrecy performance. As a consequence, traditional cryptographic techniques and complex physical layer security techniques with favorable secrecy performance may not be suitable for lightweight UEs due to high implementation complexity. Moreover, it is highly plausible that the unauthorized nodes can utilize much more powerful large antenna array, i.e., massive multiple-input multiple-output (MIMO) technology, to intercept the uplink information sent by the lightweight UEs due to the maturity of massive MIMO technology by then. Considering the possibility of facing massive MIMO eavesdropper, we propose to adopt the uplink original symbol phase rotated (UOSPR) scheme to secure the uplink transmission for lightweight single-antenna UEs in this paper. By employing the UOSPR secure transmission scheme, the lightweight UEs will randomly rotate the original information bearing symbols before they are transmitted to the BS on the uplink. This can be viewed as a symbol encryption process. The BS is then assured to be able to infer the accurate phase rotation and recover the original symbols while the massive MIMO eavesdropper can learn little useful information about the randomly rotated phase. The corresponding secrecy analysis of the UOSPR scheme on the uplink transmission is presented in detail. Furthermore, we show that the UOSPR scheme is with low complexity from the perspective of the lightweight UEs, which potentially makes it a candidate uplink secure transmission scheme in IoT and 5G scenarios. Simulation results are provided to further corroborate the effectiveness of the UOSPR secure transmission scheme.

A Novel Small-Scale Nonorthogonal Communication Technique Using Auxiliary Signal Superposition with Enhanced Security for Future Wireless Networks

2020

In this work, an advanced novel small-scale non-orthogonal communication technique utilizing physical layer security (PLS) for enhanced security and reliability for two users is proposed. This work is motivated by current challenges faced by conventional non-orthogonal multiple access (NOMA) techniques, for instance, the recent exclusion of power-domain NOMA (PD-NOMA) from 3GPP release 17 due to its performance degradation resulting from channel estimation errors and the utilization of successive interference cancellation (SIC) algorithms at the receiver. The proposed model uses the wireless channel characteristics to eliminate user interference as well as completely degrade the received signal at the eavesdropper’s terminal. More specifically, auxiliary signals are precisely designed and superimposed on top of user signals from a dual-transmitter system to provide perfect secrecy against external and internal eavesdroppers, while providing low complexity at the receiver. The effici...

A Low Complexity Joint Encryption-Modulation Method for IoT Sensor Transceivers

Electronics, 2020

Physical layer encryption (PLE) is a new research trend for securing data in communication systems. However, conventional procedures in works on PLE are of high complexity and degrade the packet error rate (PER) performance of the system. They are therefore not yet suitable for IoT sensors’ transceiver, which has limited power and computational resource. In this paper, we propose a low complexity PLE method named as joint encryption-modulation (JEM) for small transceivers such as IoT sensors. In our JEM method, data is encrypted after modulation to preserve high security. Our JEM method does not make change the constellation of the modulation after encryption; therefore, the encryption does not degrade PER performance of the system as the conventional works do. Furthermore, the encryption is performed by XOR gates and multiplexers only. It is, therefore, low complexity. Our experiment results show that the JEM method improves about 3 dB of PER performance as compared with that of co...

Physical Layer Security Scheme Based on Power E±cient Multi-antenna Transmitter

PIERS 2105: http://www.piers.org/piers2015Prague/, 2015

Security is a demanding challenge in wireless systems due to the broadcast nature of the channel. One the other hand security at physical layer can increase overall system's security since it can be combined with other security schemes from higher layers. High throughput required by modern wireless networks can be assured by MIMO (Multiple-input multiple-output), but when high spectral e±ciencies are needed multilevel modulations with high peak-to-average power ratios should be used, which may a®ect e±ciency of power mpli¯cation. This problem can be avoided by the MISO (Multi input Single Output) transmitter considered here, where transmitted multilevel constellations are the result of the combination of several uncorrelated BPSK (Bi-Phase Shift Keying) components, that are ampli¯ed and transmitted independently by an antenna. The constellation shaping done by this transmitter means directivity in the transmitted constellation that can be used to assure security at physical layer. Security as well complexity are assured since any eavesdropper must know the set of coe±cients associated to each BPSK component as well as the antenna array con¯guration. It is shown that the inherent security assured by this transmitter allows secrecy at physical layer. Several examples are analyzed and the corresponding results show the e®ectiveness of the proposed approach to implement a security scheme at physical layer level.

Empowering secure transmission for downlink of multiple access system relying non-orthogonal signal multiplexing

Bulletin of Electrical Engineering and Informatics, 2022

The growth of internet-of-things (IoT) inspired use cases in different run of the mill environments such as cities, industries, healthcare, agriculture, and transportation, has led to a greater desire for safer IoT data gathering and storage. However, securing IoT is challenging due to form-factor, complexity, energy, and connectivity limitations. Conventional coding-based security techniques are unsuitable for ultra-reliable low-latency and energy-efficient communication in IoT. Numerous research studies on physical layer security (PLS) techniques for fifth generation (5G) have emerged recently, but not all of the solutions can be used in IoT networks due to complexity limitations. Non-orthogonal multiple access (NOMA) is billed as a possible technology to solve connectivity and latency requirements in IoT. In this study, we exploit the power allocation characteristics of NOMA to enhance security in a downlink deviceto-device (D2D) decode and forward (DF) IoT network infiltrated by an eavesdropper. Our performance metric of choice is the secrecy outage probability (SOP). We formulate exact SOP results for different users. Simulation results demonstrate the positive impact of NOMA on SOP in a D2D IoT-NOMA network.