{"title":"多输入多输出无线系统的计算安全物理层算法","authors":"Raed Mesleh;Sahel Alouneh;Omar Hiari","doi":"10.1109/JSYST.2024.3370613","DOIUrl":null,"url":null,"abstract":"A computationally secure physical layer wireless communication multiple-input–multiple-output (MIMO) system is proposed and analyzed in this article. The proposed algorithm is shown to be general for arbitrary MIMO systems, and very robust against brute–force attacks and cryptanalysis techniques. The algorithm relies on the knowledge of the wireless channel statistics between the transmitter and the legitimate receiver through channel reciprocity, which is random and varies every coherence time. Both the transmitter and the legitimate receiver create a permutation vector from the sorted powers of the channel fading paths from each transmit antenna to all receive antennas. The generated permutation vector is used to shuffle the rows of the constellation matrix creating the security key. It is reported that the number of possible combinations is huge, especially for large MIMO configurations, which makes key decryption nearly impossible even with advanced supercomputers. For illustration purposes, several MIMO techniques are considered in this study, including space shift keying (SSK), quadrature SSK, quadrature spatial modulation, and spatial multiplexing.","PeriodicalId":55017,"journal":{"name":"IEEE Systems Journal","volume":"18 2","pages":"805-813"},"PeriodicalIF":4.0000,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Computational Secure Physical Layer Algorithm for MIMO Wireless Systems\",\"authors\":\"Raed Mesleh;Sahel Alouneh;Omar Hiari\",\"doi\":\"10.1109/JSYST.2024.3370613\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A computationally secure physical layer wireless communication multiple-input–multiple-output (MIMO) system is proposed and analyzed in this article. The proposed algorithm is shown to be general for arbitrary MIMO systems, and very robust against brute–force attacks and cryptanalysis techniques. The algorithm relies on the knowledge of the wireless channel statistics between the transmitter and the legitimate receiver through channel reciprocity, which is random and varies every coherence time. Both the transmitter and the legitimate receiver create a permutation vector from the sorted powers of the channel fading paths from each transmit antenna to all receive antennas. The generated permutation vector is used to shuffle the rows of the constellation matrix creating the security key. It is reported that the number of possible combinations is huge, especially for large MIMO configurations, which makes key decryption nearly impossible even with advanced supercomputers. For illustration purposes, several MIMO techniques are considered in this study, including space shift keying (SSK), quadrature SSK, quadrature spatial modulation, and spatial multiplexing.\",\"PeriodicalId\":55017,\"journal\":{\"name\":\"IEEE Systems Journal\",\"volume\":\"18 2\",\"pages\":\"805-813\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2024-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Systems Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10461489/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Systems Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10461489/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
本文提出并分析了一种计算安全的物理层无线通信多输入多输出(MIMO)系统。研究表明,所提出的算法适用于任意 MIMO 系统,对暴力破解攻击和密码分析技术具有很强的抵抗力。该算法依赖于发射机和合法接收机之间通过信道互易性获得的无线信道统计信息。发射器和合法接收器都会根据从每个发射天线到所有接收天线的信道衰落路径的排序功率创建一个置换向量。生成的置换向量用于洗牌星座矩阵的行,从而创建安全密钥。据报道,可能的组合数量非常大,尤其是对于大型多输入多输出(MIMO)配置而言,即使使用先进的超级计算机,也几乎不可能解密密钥。为了说明问题,本研究考虑了几种多输入多输出技术,包括空间移动键控(SSK)、正交 SSK、正交空间调制和空间多路复用。
Computational Secure Physical Layer Algorithm for MIMO Wireless Systems
A computationally secure physical layer wireless communication multiple-input–multiple-output (MIMO) system is proposed and analyzed in this article. The proposed algorithm is shown to be general for arbitrary MIMO systems, and very robust against brute–force attacks and cryptanalysis techniques. The algorithm relies on the knowledge of the wireless channel statistics between the transmitter and the legitimate receiver through channel reciprocity, which is random and varies every coherence time. Both the transmitter and the legitimate receiver create a permutation vector from the sorted powers of the channel fading paths from each transmit antenna to all receive antennas. The generated permutation vector is used to shuffle the rows of the constellation matrix creating the security key. It is reported that the number of possible combinations is huge, especially for large MIMO configurations, which makes key decryption nearly impossible even with advanced supercomputers. For illustration purposes, several MIMO techniques are considered in this study, including space shift keying (SSK), quadrature SSK, quadrature spatial modulation, and spatial multiplexing.
期刊介绍:
This publication provides a systems-level, focused forum for application-oriented manuscripts that address complex systems and system-of-systems of national and global significance. It intends to encourage and facilitate cooperation and interaction among IEEE Societies with systems-level and systems engineering interest, and to attract non-IEEE contributors and readers from around the globe. Our IEEE Systems Council job is to address issues in new ways that are not solvable in the domains of the existing IEEE or other societies or global organizations. These problems do not fit within traditional hierarchical boundaries. For example, disaster response such as that triggered by Hurricane Katrina, tsunamis, or current volcanic eruptions is not solvable by pure engineering solutions. We need to think about changing and enlarging the paradigm to include systems issues.