Physical Layer Authentication (PLA) in wireless systems has drawn much attention because it can provide information-theoretic security. However, the performance of the prior PLA schemes significantly declines under a ...
详细信息
Physical Layer Authentication (PLA) in wireless systems has drawn much attention because it can provide information-theoretic security. However, the performance of the prior PLA schemes significantly declines under a frequency selective fading channel and the theoretical analysis of a PLA scheme becomes extremely challenging under a frequency selective fading channel as compared to that under a frequency flat fading channel. This paper addresses the problem of authenticating transmitters at the physical layer under a frequency selective fading channel. We propose two tag-based PLA schemes under a frequency selective fading channel. The first scheme is the Generalized Tag-based PLA (GT-PLA) scheme, where the negative effect caused by a frequency selective fading channel is compensated for. If the channel reciprocity holds, we will propose the second scheme to further improve the performance of the GT-PLA scheme, named the Adaptive Generalized Tag-based PLA (AGT-PLA) scheme. We provide the theoretical analysis of both proposed schemes over wireless fading channels in terms of robustness, security, and compatibility, and derive their closed-form expressions. Moreover, we implement the proposed schemes and conduct extensive performance comparisons. Our experimental results demonstrate that the GT-PLA scheme achieves higher robustness over the prior PLA schemes while the AGT-PLA scheme can further improve the performance of the GT-PLA scheme in terms of robustness, security, and compatibility.
We present a compact electromagnetically actuated 3D-printed rotary actuator for use in Scanning Capsule Endoscopy. The actuator comprises two cantilevers connected to a rotating body via nylon strings. External coils...
详细信息
We present a compact electromagnetically actuated 3D-printed rotary actuator for use in Scanning Capsule Endoscopy. The actuator comprises two cantilevers connected to a rotating body via nylon strings. External coils and the magnets placed on the cantilevers create an electromagnetic force with which the rotation can be initiated. Opposite coils are driven out-of-phase to enable resonant actuation. An electrical circuit model and finite element simulation results of the fundamental mode frequency are provided for the designed device. The design is manufactured via fused deposition modeling using polylactic acid (PLA) and thermoplastic polyurethane (TPU). Experimental results reveal a 98. total scan angle at 21 Hz resonance for the TPU actuator and a 19.7. total scan angle at 237 Hz resonance for the PLA actuator. Overall, the presented rotary actuator compares favorably over i) micromotor counterparts in terms of form factor (having a diameter of 13 mm and a total height of 7 mm) and ii) MEMS counterparts in terms of total scan angle. Manufacturing cost and duration are yet other benefits of the presented device, owing to 3D printing technique. With further development, the presented device can serve within a disposable capsule endoscopy unit for clinical use.
A new multi-materials' compact topology, allowed by multi-materials 3-D-printing, is proposed to design microwave terminations in rectangular waveguide technology. The concept is based on a Salisbury-like resonant...
详细信息
A new multi-materials' compact topology, allowed by multi-materials 3-D-printing, is proposed to design microwave terminations in rectangular waveguide technology. The concept is based on a Salisbury-like resonant absorber constituted of a 3-D-printed polylactic acid (PLA) dielectric spacer and a lossy dielectric in the form of a pad whose dimensions allow controlling the frequency of maximum absorption. The flange of the termination is also printed with a lossy dielectric to achieve a compact and low-weight component that can be directly connected to a standard metallic waveguide. The concept has been validated experimentally in K-band (18-26 GHz) and X-band (8-12 GHz) with relative bandwidths (RBWs) around 20% for both frequency bands. These components demonstrate a quite stable temperature behavior. The power-handling capability (PHC) has been investigated through simulations and experiments. It was demonstrated that the maximum power than can support the termination is around 4-5 times lower than a more standard and bulky termination made with the same materials.
This article concerns the problem of ensuring the security of the tag-based Physical-Layer Authentication (PLA) schemes under multiple cooperative attackers. This problem is important and challenging because of the fo...
详细信息
This article concerns the problem of ensuring the security of the tag-based Physical-Layer Authentication (PLA) schemes under multiple cooperative attackers. This problem is important and challenging because of the following reasons. First, if more attackers launch a cooperative attack, the success probability of launching an eavesdropping attack will be improved. Second, based on a cooperative communication system, cooperative attackers can launch more advanced attacks, e.g., a cooperative attack that traps the legitimate user to re-transmit the same tag again. Thus, it is challenging and desirable to construct a secure tag-based PLA scheme under multiple cooperative attackers. For effectively defending against a cooperative attack under multiple coop-erative attackers, we propose a new tag-based PLA scheme, referred to as the PLA with the Detection of a Cooperative Attack (PLA-DCA) scheme. The basic idea of the PLA-DCA scheme is to utilize the extra noise in a replayed signal, since a replayed signal inevitably changes the distribution property of receiver noise, e.g., increment of the noise variance. Then, we implemented the proposed scheme and conducted extensive performance comparisons to demonstrate the superiority of the proposed scheme. We evaluate the security of various schemes through equivocation, which represents the uncertainty of estimating a tag. From the simulation results, we verify that the proposed scheme provides higher security than the prior tag-based PLA schemes.
This article provides an overview of five physical-layer security mechanisms: Physical-Layer Authentication (PLA), Physical-Layer Confidential Communications (PLCC), Physical-Layer Key Generation (PLKG), Physical-Laye...
详细信息
This article provides an overview of five physical-layer security mechanisms: Physical-Layer Authentication (PLA), Physical-Layer Confidential Communications (PLCC), Physical-Layer Key Generation (PLKG), Physical-Layer Communications with Low Probability of Detection (PLC-LPD), and Physical-Layer Steganography (PLS). We explain the relationship among five physical-layer security mechanisms. Then, we review the features of various physical-layer security mechanisms in terms of the basic idea, properties, assumptions, classification, threat model, and applications, respectively. At last, we introduce five promising plans by combining different physical-layer security mechanisms to further improve the final performance.
Internet of Things (IoT) devices have become ubiquitous due to the prevalence of the Internet. However, the open nature of wireless networks makes them susceptible to spoofing attacks. Moreover, their heterogeneous ch...
详细信息
Internet of Things (IoT) devices have become ubiquitous due to the prevalence of the Internet. However, the open nature of wireless networks makes them susceptible to spoofing attacks. Moreover, their heterogeneous characteristics create authentication challenges which are increasing due to the tremendous growth in the number and variety of devices. Physical-layer authentication (PLA) provides a solution by utilizing the unique characteristics of wireless channels to aid upper layer authentication (ULA). In this article, an adaptive PLA scheme is proposed which exploits the antenna diversity inherent in multiple-input multiple-output (MIMO) systems. This scheme employs a one-class classification support vector machine (OCC-SVM) with the magnitude and real and imaginary parts of the received signals as features. Results are presented which show that this scheme provides robust authentication. The authentication performance is evaluated considering two majority voting schemes for IoT applications.
Neural-like P systems with plasmids (NP P systems, in short) are a kind of distributed and parallel computing systems inspired by the activity that bacteria process DNA such as plasmids. An important biological fact i...
详细信息
Neural-like P systems with plasmids (NP P systems, in short) are a kind of distributed and parallel computing systems inspired by the activity that bacteria process DNA such as plasmids. An important biological fact is that one or more pili have existed between two neighboring bacteria during the conjugation process, and this phenomenon can be abstracted into the concept of multiple channels. In this paper, we raise a type of distinctive P system that the neural-like P systems with plasmids and multiple channels (NPMC P systems, in short). In NPMC P systems, one or more channels are established between neighboring bacteria, each channel marked by the associated label is used to control the communication between two bacteria. Rules are applied in sequential order: each channel can only have one rule applied at a time. The computation power of NPMC P systems is explored. In particular, we show that NPMC P systems satisfy Turing universality in both the generating and accepting modes. If we limit the number of plasmids in any bacteria during a computation, then the power of NPMC P systems decreased drastically, but the characterization of semilinear sets of numbers is obtained (SLIN, in short).
Recently, physical-layer authentication (PLA) has attracted much attention since it takes advantage of the channel randomness nature of transmission media to achieve communication confidentiality and authentication. I...
详细信息
Recently, physical-layer authentication (PLA) has attracted much attention since it takes advantage of the channel randomness nature of transmission media to achieve communication confidentiality and authentication. In the complex environment, such as the Industrial Internet of Things (IIoT), machine learning (ML) is widely employed with PLA to extract and analyze complex channel characteristics for identity authentication. However, most PLA schemes for IIoT require attackers' prior channel information, leading to severe performance degradation when the source of the received signals is unknown in the training stage. Thus, a channel impulse response (CIR)-based PLA scheme named "hierarchical variational autoencoder (HVAE) " for IIoT is proposed in this article, aiming at achieving high authentication performance without knowing attackers' prior channel information even when trained on a few data in the complex environment. HVAE consists of an autoencoder (AE) module for CIR characteristics extraction and a variational AE (VAE) module for improving the representation ability of the CIR characteristic and outputting the authentication results. Besides, a new objective function is constructed in which both the single-peak and the double-peak Gaussian distributions are taken into consideration in the VAE module. Moreover, the simulations are conducted under the static and mobile IIoT scenario, which verify the superiority of the proposed HVAE over three comparison PLA schemes even with a few training data.
Tensor algebra finds applications in various domains, including machine learning applications, data analytics, and others. Spatial hardware accelerators are widely used to boost the performance of tensor algebra appli...
详细信息
Tensor algebra finds applications in various domains, including machine learning applications, data analytics, and others. Spatial hardware accelerators are widely used to boost the performance of tensor algebra applications. It has a complex hardware architecture and rich design space. Prior approaches based on manual implementation lead to low programming productivity, making it hard to explore the large design space. In this article, we propose Tensorlib, a framework for generating spatial hardware accelerators for tensor algebra applications. Tensorlib is motivated by the observation that, tensor dataflows can be expressed with linear transformations, and they share common hardware modules which can be reused across different designs. Tensorlib first uses space-time transformation to explore different dataflows, which can compactly represent the hardware dataflow using a transformation matrix. Next, we identify the common structures of different dataflows and build parameterized hardware module templates. Our generation framework can select the needed hardware modules for each dataflow, connect the modules using a specified interconnection pattern, and automatically generate the complete hardware accelerator design. Tensorlib remarkably improves the productivity for the development and optimization of spatial hardware architecture, providing a rich design space with tradeoffs in performance, area, and power. Experiments show that Tensorlib can automatically generate hardware designs with different dataflows for a variety of tensor algebra programs. Tensorlib can achieve 318-MHz frequency and 786-GFLOP/s throughput for matrix multiplication kernel on Xilinx VU9P FPGA, which outperforms the state-of-the-art generators.
Ambient backscatter communication (AmBC) and non-orthogonal multiple access (NOMA) are two promising technologies for the future wireless communication networks owing to their high energy and spectral efficiencies. Th...
详细信息
Ambient backscatter communication (AmBC) and non-orthogonal multiple access (NOMA) are two promising technologies for the future wireless communication networks owing to their high energy and spectral efficiencies. The AmBC-aided NOMA symbiotic radio is a promising technology because of possessing advantages of AmBC and NOMA. Nonetheless, when a number of devices with limited power and computation capability access to the AmBC-based NOMA symbiotic networks, communication security becomes a critical issue. In this paper, we investigate physical-layer authentication (PLA) to identify the users and prevent illegal access and malicious activities for AmBC-based NOMA symbiotic networks. Moreover, channel estimation errors are considered when calculating the probability of false alarm (PFA) and probability of detection (PD) of the far user and near user. To enhance the authentication performance, three PLA schemes for the considered networks are designed according to the multiplexing form of the authentication tags: i) PLA with shared authentication tag (PLA-SAT);ii) PLA with space division multiplexing authentication tags;iii) PLA with time-division multiplexing authentication tags. To characterize the proposed PLA schemes, we first derive the PFA and the PD of the considered AmBC-based NOMA symbiotic networks. Then, the covertness is studied in terms of outage probability and asymptotic behavior in the high signal-to-noise ratio regime. Extensive analytical and computer simulated results show that: i) The PLA-SAT scheme has better performance than the other two authentication schemes with the same threshold;ii) The outage performance of systems employing authentication schemes is worse than those without authentication;iii) There exists a trade-off between robustness and covertness.
暂无评论