Automatic repeat-request system for providing absolute safety and authentication in wireless networks
11075710 · 2021-07-27
Inventors
Cpc classification
H04K1/02
ELECTRICITY
H04K2203/36
ELECTRICITY
H04L5/0007
ELECTRICITY
H04L1/1825
ELECTRICITY
H04K3/28
ELECTRICITY
International classification
H04K1/02
ELECTRICITY
H04K1/10
ELECTRICITY
H04L9/32
ELECTRICITY
H04L9/08
ELECTRICITY
Abstract
A system and method for providing confidentiality against eavesdropping and authentication against impersonation attacks for advanced wireless communication systems are disclosed. The method exploits ARQ as a MAC layer mechanism and artificial noise as a physical layer mechanism with maximal ratio combining to achieve secrecy. An artificial noise, not requiring class space in the channel, is designed and added to the data package based on the QoS requirements and channel condition between legitimate parties. Basically, a special AN, which does not require null-space in the channel, is designed based on the QoS requirements and the channel condition between the legitimate parties and injected to the data packet. If the same packet is requested by the legitimate receiver (Bob), an AN cancelling signal is designed and added to the next packet. Then, an AN-free packet is obtained by using MRC process at Bob, while deteriorating the eavesdropper's performance.
Claims
1. A method and system designed to provide data authentication against absolute data privacy and spoofing against hidden eavesdropping without the need for extra changes or leading extra changes on the receiving side and without the use of or secret keys in wireless communication systems, comprising: at least one superimposed mixer signal that runs on a transmitter Tx and converts data packets required to be transferred in the device into secure, stored data packets, added to the data packet to be transmitted in a first Automatic Repeat-Request (ARQ) round, named sequential noise r1; at least a second superimposed mixer signal that runs on the transmitter Tx and converts data packets required to be transferred in the device into secure, stored data packets, added to the data packet to be transmitted in a second ARQ round, named sequential noise r2; at least one maximal ratio combination (MRC) process that can combine the first received data packet and the second received data packet in a manner designed to cancel and remove the interference effect of the superimposed mixer signals r1 and r2 while improving the reliability of the data acquisition quality.
2. A system according to the claim 1, characterized by the appropriately designed superimposed mixer signals, which are configured to operate on the transmitter Tx on a device that can exchange secure data with wireless networks, as well as a function of Quality of service (QoS) requirements of the service to be secured with legitimate channel width.
3. A system according to the claim 1, wherein the addition of superimposed mixer signals designed and configured to completely cancel the interference effects at the location of the legitimate receiver, while causing interference in the receiving nodes of a different position.
4. A system according to the claim 1, wherein the spatial degree of freedom (zero space generated by the multiple antennas) is absent, the channel is located within the flat damping (ie, there is no more possibility) and can provide privacy in one of the most challenging scenarios with a single antenna on the transmitting side.
5. A system according to the claim 1, characterized not only by increasing the privacy but also by reducing the level of Peak-to-Average Power Ratio (PAPR) and alleviating the Out-of-Band Emission (OOBE) level of OFDM-based (Orthogonal Frequency Division Multiplexing) systems, as well as creating additional degrees of freedom within the force field due to the inserted Artificial Noise (AN) which can be used for other purposes.
6. A system according to the claim 1, wherein it can be obtained by using OFDM based waveforms over the distribution channels.
Description
DESCRIPTION OF PICTURES
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
DETAILED DESCRIPTION OF THE INVENTION
(11) This invention describes a practical and very effective security method and system. In particular, a mixer signal (ie, Artificial Noise) is added/superimposed on the transmission data packet x, (in the force field) on each retransmission packet, based on the channel acquisition and QoS requirements of the legitimate user. The added mixer Artificial Noise signals are designed to match each other on Bob's side, while the performance of Eve is significantly impaired when they are assembled on the receiver side using the MRC process. To achieve this, Artificial Noise, designed in a way that does not depend on zero spaces in the channel, in contrast to the existing Artificial Noise-based safety schemes in the literature, is appropriately added on the time domain signal vector (force field) in the first and second retransmission rounds and thus in the first and second rounds new received signal vectors appear as follows:
y.sub.i,1=h.sub.i,1(x+r.sub.1)+w.sub.i,1 (A)
y.sub.i,2=h.sub.i,2(x+r.sub.2)+w.sub.i,2 (B)
(12) Here, yi, 1 and yi, 2 shows packages taken by Eve or Bob in the first and second rounds, r1∈CN×1 (3) ve r2∈CN×1 (5) are Artificial Noise vectors added in the first and second rounds respectively. Following the MRC process on the receiving side, y{circumflex over ( )}i is as follows:
y{circumflex over ( )}.sub.i=y.sub.i,1h*.sub.i,1+yi,2h* (C)
y{circumflex over ( )}.sub.i=x|h.sub.i,1|2+|h.sub.i,2|2+r.sub.1|h.sub.i,1|2+r.sub.2|h.sub.i,2|2+w{circumflex over ( )}.sub.i (D)
(13) From this equation (D), we find that it is possible to design the Artificial Noise added on the transmitting side with the values r1 and r2 in such a way that it can be fully canceled only on the Bob side, as illustrated graphically in the upper part of
(14)
g=√{square root over (0.5ϕ)}((2u−1)+j(2q−1)) (G)
(15) Here the samples of g=[g1 g2 . . . gN]T∈CN×1 can be seen as a random vector, which can vary from one symbol to another independently of a given distribution. Thus, g may also be perceived as a single-use cipher key whose length is equal to the message length with the entropy equal to that of the message in question and does not need to be shared with the receiving side. It should also be mentioned that the design of the g design provides freedom in the following issues: 1) the modification of the structure (or distribution) of the added Artificial Noise, 2) Adjusting the added Artificial Noise force, based on QoS requirements; 3) controlling the PAPR problem resulting from Artificial Noise, which is designed to have a continuous envelope with a uniform stage distribution.
(16) In the proposed scheme, the g value is designed to have a uniform stage distribution with a fixed envelope (such as a QAM signal) in the (G) equality (such as QAM signal), in that equation, ϕ is the force (variance) of the added Artificial Noise vector and is optimized based on the targeted security level to be displayed later with QoS requirements. Without losing the generality, the g value is designed to avoid the PAPR problem due to the fact that there is a fixed envelope in the uniform stage distribution as a result of the zero increase in PAPR. In order to achieve this, u and q vectors are selected to be random variables with Bernoulli distribution with one and zero values. It should also be emphasized that many of the Artificial Noise-based safety methods available in the literature use Gaussian distributed noise, which leads to a significant increase in PAPR level only because it does not have a fixed envelope. To the best of our knowledge, the PAPR problem is often neglected in existing Artificial Noise-based security methods, and this study sheds light on this problem and provides a practical solution to this problem.
(17) On the receiving sides, the data signal vectors detected on both Bob's and Eve's side are as follows:
(18)
(19) When the values of r1 and r2 in equation (D) are changed, the Artificial Noise added intentionally are cancelled completely. Therefore, the determined x{circumflex over ( )} package shown in equation (H) is the same if there is no Artificial Noise added. This means that Bob's package error rate (PER) performance will in no way be affected by the use of this method. When we look at Eve's side, as Eve doesn't know Alice's channel (due to the use of robust techniques for estimating channel in TDD systems) or the added Artificial Noise vector g value (as it is not shared with the communicating parties), there will be a significant deterioration, regardless of whether MRC is used by Eve or not.
(20) If the MRC is used, additional mixing noise resulted from the zero removal process will affect the PER level. On the other hand, in the absence of MRC usage, Artificial Noise added to each retransmission tour will automatically affect the PER value. It may be stated that the level of privacy is increasing due to the added Artificial Noise vector g value, which is added essentially by the proposed scheme, but it should also be stated that if the channel is distributed in time, frequency or both, not in flat damping, an additional source of confidentiality can be obtained.
(21) Artificial Noise can only be redesigned based on the practical use of the wireless service, not just the Bob side channel, but also based on the QoS requirements of the requested service. Therefore, only the optimum Artificial Noise (OAN) with sufficient strength to reduce Eve's reception performance is added while trying to keep Bob's performance at the level prior to Artificial Noise addition. The following steps outline how the security method proposed in the context of LTE and future 5G and beyond networks:
(22) TABLE-US-00001 TABLE I QoS LOOKUP TABLE Service Delay L PERt .sub.tSNRe ϕ Voice 100 ms 2 10-2 30 dB 0.01 Video 150 ms 3 10-3 40 dB 0.001 1. The transmitter (Enode-B) determines which service the legitimate wireless user is intending to use. 2. According to the requested service, Enode-B (Alice) determines a PER threshold (PERt) from a look-up table, as presented in Table I, which is required to reliably accommodate a legitimate user with the requested service. 3. Based on the determined PER and from the extensive off-line PER simulation results obtained for Eve, Enode-B identifies the corresponding required SNR for Eve (SNRe) to eavesdrop the service reliably. 4. From the found SNR, Enode-B calculates a rough optimum value for the needed noise power to sufficiently degrade Eve's performance using this formula,
(23)
(24) According to this method, it is seen that there is no need to have a perfect level of privacy in order to provide a completely secure communication in many services that are used daily, such as audio and video. This is because this method forces Eve to work in such a way that it cannot achieve the QoS requirements needed to interrupt and reliably use such services. Therefore, there is no way to benefit from the ongoing service. Although we aim to achieve a good trade-off between reliability, efficiency, delay and confidentiality at the outset, our method shows that, with efficiency only half reduced, an excellent level of confidentiality can be achieved to provide full secure messaging.
(25) This is ensured by the fact that the first packet transmission is always received incorrectly, while in the second round the retransmitted packet is received by sending an appropriate noise force, the noise added in the first round can be completely canceled. It has been found out that this can be achieved by using a comprehensive simulation, provided that the added Artificial Noise variance is equal to the SNR of Bob (ie, =SNRdB).
Utilizing the Proposed Design for Reducing PAPR and OOBE of OFDM-Based Waveforms
(26) In addition to the privacy level, the added Artificial Noise can also be used to achieve other benefits. In particular, the added Artificial Noise structure can be intelligently redesigned not only to provide security, but also to reduce the PAPR value in OFDM systems and to alleviate the OOBE value. Here we discuss two new designs that can achieve the aforementioned objectives. In the first embodiment, the Artificial Noise signal may be optimized to reduce the PAPR value, subject to a particular privacy condition defined by the added Artificial Noise force level; in the second design, the Artificial Noise signal may be redesigned to minimize the OOBE level, which is indirectly subject to a level of force represented by a well-defined privacy restriction. Furthermore, with the use of the proposed safety method in multi-carrier systems, it should be mentioned that it provides a more resilient method to those eavesdropping because of the greater possibility of multi-path frequency selective channels in OFDM. In particular, the possibility of channel-based Artificial Noise added in the case of OFDM comes not only from randomly generated samples on the transmitter side, but also from the possibility of a multi-path frequency selective channel.
(27) It is evident that one skilled in the technique can also introduce the novelty set forth in the invention using similar embodiments, and/or apply this embodiment to other similar purposes as used in the technique. Thus, it is evident that such embodiments will be devoid of the criterion of innovation and in particular of exceeding the known state of the art.
INDUSTRIAL APPLICABILITY/APPLICATION OF INVENTION TO INDUSTRIALIZATION
(28) It is very possible to transfer the described invention to the industry by proposing its technical advantages and merits to the wireless standardization communities such as IEEE, 3GPP, and ITU to adopt it in the future standards. Also, the invention can be utilized by high-tech wireless security companies that are interested in building secure wireless communication devices including access points, base stations, mobile handset, and IoT terminals. Specifically, the merits of the proposed design can make it a good candidate solution for future secure wireless systems (5G and Beyond).