Abstract
The Multiple-Input Multiple-Output (MIMO) technology is one of the key enablers of the 5G system. This technology allows the concurrent transmission of data using multiple antennas, which increases the channel robustness, overall throughput and link capacity. The security of 5G systems is very critical and it has received serious attention from various research groups. To that end, physical layer security (PLS) has recently emerged as a promising candidate to enhance network security, and several PLS schemes have been proposed for MIMO systems. Most of these MIMO PLS solutions target data confidentiality, however, they suffer from a main limitation due to relying solely on the random parameters of the channel. To overcome this limitation, we propose a PLS cipher solution for D2D MIMO systems, which is based on the dynamic key structure and several other factors including a private key and a physical channel parameter. Both of these parameters are combined to produce a dynamic key, which is used to generate the cipher primitives that are used to encrypt or decrypt data frames. For every input frame, the cipher primitives are updated, and for each frame symbol, the selection cipher primitives are updated. The update process is designed to enhance the security level and to ensure the avalanche effect in a simple and lightweight manner. Consequently, the proposed technique achieves high immunity against existing attacks due to the dynamic property which complicates the attacker’s tasks. A high efficiency level is also attained since a single round with simple cipher operations are employed. The proposed scheme decreases the required latency, resources and overhead in comparison to security schemes at upper layers of the D2D MIMO communication system. Finally, we conducted several security and performance tests to evaluate the proposed solution and to prove its robustness and efficiency.
Similar content being viewed by others
References
Tsoulos, George. (2006). MIMO system technology for wireless communications. Boca Raton: CRC Press.
Sivakrishna, S., and Yarrabothu, R. (2018). Design and simulation of 5g massive MIMO kernel algorithm on SIMD vector processor. In Conference on signal processing and communication engineering systems (SPACES), pp. 53–57. IEEE
Melki, R., Noura, H., Mansour, M., & Chehab, A. (2020). Physical layer security schemes for MIMO systems: an overview. Wireless Networks, 26(3), 2089–2111.
Melki, R., Noura, H., Mansour, M., & Chehab, A. (2019). A survey on OFDM physical layer security. Physical Communication, 32, 1–30.
Yaacoub, E., and Al-Husseini, M. (2017). Achieving physical layer security with massive MIMO beamforming. In 2017 11th European conference on antennas and propagation (EUCAP), pp. 1753–1757, March
Janvier (2019) Spatial multiplexing - matlab & simulink - mathworks france. https://fr.mathworks.com/help/comm/examples/spatial-multiplexing.html
Li, X., Huang, H. C., Lozano, A., & Foschini, G. J. (2000). Reduced-complexity detection algorithms for systems using multi-element arrays. In Globecom’00-IEEE. global telecommunications conference. Conference record (Cat. No. 00CH37137), (Vol. 2, pp. 1072–1076). IEEE
Salameh, H., et al. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5(3), 1904–1913.
Delfs, H., Knebl, H., & Knebl, H. (2002). Introduction to cryptography (Vol. 2). Berlin: Springer.
Buyya, R., Calheiros, R., & Dastjerdi, A. (2016). Big data: Principles and paradigms. Burlington: Morgan Kaufmann.
Tanigawa et al. Y., (2017). A physical layer security scheme employing imaginary receiver for multiuser MIMO-OFDM systems. In International conference on communications (ICC), pp. 1–6
Ahmed, M., & Lin, Bai (2017). Space time block coding aided physical layer security in gaussian MIMO channels. In International Bhurban conference on applied sciences and technology (IBCAST), pp. 805–808
Li, G., & Hu, A. (2016). Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security. In IEEE proc. int. conf. commun. China (ICCC), pp. 2246–2250
Zhang, Y., et. al. (2015). Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels. In IEEE proc. int. conf. commun. China (ICCC), pp. 1–6
Fan, Y., et al. (2017). Physical layer security based on interference alignment in K-User MIMO Y wiretap channels. IEEE Access, 5, 5747–5759.
Chen, X., & Zhang, Y. (2017). Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Systems Journal, 11(2), 1128–1136.
Thangaraj, A., Dihidar, S., Calderbank, A., McLaughlin, S., & Merolla, J. (2007). Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory, 53(8), 2933–2945.
Wyner, A. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.
Csiszár, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.
Subramanian, A., Thangaraj, A., Bloch, M., & McLaughlin, S. (2011). Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Transactions on Information Forensics and Security, 6(3), 585–594.
Chen, D., Zhang, N., Cheng, N., Zhang, K., Qin, Z., & Shen, X. (2018). Physical layer based message authentication with secure channel codes. IEEE Transactions on Dependable and Secure Computing,. https://doi.org/10.1109/TDSC.2018.2846258.
Fang, X., Zhang, N., Zhang, S., Chen, D., Sha, X., & Shen, X. (2017). On physical layer security: Weighted fractional Fourier transform based user cooperation. IEEE Transactions on Wireless Communications, 16(8), 5498–5510.
Usama, M., Rehman, O., Memon, I., & Rizvi, S. (2019). An efficient construction of key-dependent substitution box based on chaotic sine map. International Journal of Distributed Sensor Networks, 15(12), 1550147719895957.
Zhao, X., Abdo, A., Xu, C., Geng, S., Zhang, J., & Memon, I. (2018). Dimension reduction of channel correlation matrix using CUR-decomposition technique for 3-D massive antenna system. IEEE Access, 6, 3031–3039.
Abdo, A., Zhao, X., Zhang, R., Zhou, Z., Zhang, J., Zhang, Y., et al. (2018). MU-MIMO downlink capacity analysis and optimum code weight vector design for 5G big data massive antenna millimeter wave communication. Wireless Communications and Mobile Computing,. https://doi.org/10.1155/2018/7138232.
Shifa, A., Afgan, M. S., Asghar, M. N., Fleury, M., Memon, I., Abdullah, S., et al. (2018). Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access, 6, 16189–16206.
Madhusudhan, R., Hegde, M., & Memon, I. (2018). A secure and enhancedelliptic curve cryptography-based dynamic authentication scheme using smart card. International Journal of Communication Systems. https://doi.org/10.1002/dac.3701
Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.
Memon, I., & Arain, Q. (2017). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 639–672.
Melki FN: R., et al. (2018). An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal, 6, 361.
Noura, H., et al. (2018). A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach. Mobile Networks and Applications, 24, 447.
Noura, H., et al. (2018). Efficient and secure physical encryption scheme for low-power wireless M2M devices. In IWCMC security symposium, Limassol: Cyprus
Noura, H., Chehab, A., Sleem, L., Noura, M., Couturier, R., & Mansour, M. M. (2018). One round cipher algorithm for multimedia IoT devices. Multimedia Tools and Applications, 77(14), 18383–18413.
Baldini, G., Giuliani, R., & Dimc, F. (2019). Physical layer authentication of internet of things wireless devices using convolutional neural networks and recurrence plots. Internet Technology Letters, 2(2), e81.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Noura, H.N., Melki, R., Kanj, R. et al. Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme. Wireless Netw 27, 557–574 (2021). https://doi.org/10.1007/s11276-020-02468-z
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-020-02468-z