Skip to main content

Advertisement

Log in

Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The Multiple-Input Multiple-Output (MIMO) technology is one of the key enablers of the 5G system. This technology allows the concurrent transmission of data using multiple antennas, which increases the channel robustness, overall throughput and link capacity. The security of 5G systems is very critical and it has received serious attention from various research groups. To that end, physical layer security (PLS) has recently emerged as a promising candidate to enhance network security, and several PLS schemes have been proposed for MIMO systems. Most of these MIMO PLS solutions target data confidentiality, however, they suffer from a main limitation due to relying solely on the random parameters of the channel. To overcome this limitation, we propose a PLS cipher solution for D2D MIMO systems, which is based on the dynamic key structure and several other factors including a private key and a physical channel parameter. Both of these parameters are combined to produce a dynamic key, which is used to generate the cipher primitives that are used to encrypt or decrypt data frames. For every input frame, the cipher primitives are updated, and for each frame symbol, the selection cipher primitives are updated. The update process is designed to enhance the security level and to ensure the avalanche effect in a simple and lightweight manner. Consequently, the proposed technique achieves high immunity against existing attacks due to the dynamic property which complicates the attacker’s tasks. A high efficiency level is also attained since a single round with simple cipher operations are employed. The proposed scheme decreases the required latency, resources and overhead in comparison to security schemes at upper layers of the D2D MIMO communication system. Finally, we conducted several security and performance tests to evaluate the proposed solution and to prove its robustness and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Tsoulos, George. (2006). MIMO system technology for wireless communications. Boca Raton: CRC Press.

    Book  Google Scholar 

  2. Sivakrishna, S., and Yarrabothu, R. (2018). Design and simulation of 5g massive MIMO kernel algorithm on SIMD vector processor. In Conference on signal processing and communication engineering systems (SPACES), pp. 53–57. IEEE

  3. Melki, R., Noura, H., Mansour, M., & Chehab, A. (2020). Physical layer security schemes for MIMO systems: an overview. Wireless Networks, 26(3), 2089–2111.

    Article  Google Scholar 

  4. Melki, R., Noura, H., Mansour, M., & Chehab, A. (2019). A survey on OFDM physical layer security. Physical Communication, 32, 1–30.

    Article  Google Scholar 

  5. Yaacoub, E., and Al-Husseini, M. (2017). Achieving physical layer security with massive MIMO beamforming. In 2017 11th European conference on antennas and propagation (EUCAP), pp. 1753–1757, March

  6. Janvier (2019) Spatial multiplexing - matlab & simulink - mathworks france. https://fr.mathworks.com/help/comm/examples/spatial-multiplexing.html

  7. Li, X., Huang, H. C., Lozano, A., & Foschini, G. J. (2000). Reduced-complexity detection algorithms for systems using multi-element arrays. In Globecom’00-IEEE. global telecommunications conference. Conference record (Cat. No. 00CH37137), (Vol. 2, pp. 1072–1076). IEEE

  8. Salameh, H., et al. (2018). Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet of Things Journal, 5(3), 1904–1913.

    Article  Google Scholar 

  9. Delfs, H., Knebl, H., & Knebl, H. (2002). Introduction to cryptography (Vol. 2). Berlin: Springer.

    Book  Google Scholar 

  10. Buyya, R., Calheiros, R., & Dastjerdi, A. (2016). Big data: Principles and paradigms. Burlington: Morgan Kaufmann.

    Google Scholar 

  11. Tanigawa et al. Y., (2017). A physical layer security scheme employing imaginary receiver for multiuser MIMO-OFDM systems. In International conference on communications (ICC), pp. 1–6

  12. Ahmed, M., & Lin, Bai (2017). Space time block coding aided physical layer security in gaussian MIMO channels. In International Bhurban conference on applied sciences and technology (IBCAST), pp. 805–808

  13. Li, G., & Hu, A. (2016). Virtual MIMO-based cooperative beamforming and jamming scheme for the clustered wireless sensor network security. In IEEE proc. int. conf. commun. China (ICCC), pp. 2246–2250

  14. Zhang, Y., et. al. (2015). Joint transmit antenna selection and jamming for security enhancement in MIMO wiretap channels. In IEEE proc. int. conf. commun. China (ICCC), pp. 1–6

  15. Fan, Y., et al. (2017). Physical layer security based on interference alignment in K-User MIMO Y wiretap channels. IEEE Access, 5, 5747–5759.

    Article  Google Scholar 

  16. Chen, X., & Zhang, Y. (2017). Mode selection in MU-MIMO downlink networks: A physical-layer security perspective. IEEE Systems Journal, 11(2), 1128–1136.

    Article  Google Scholar 

  17. Thangaraj, A., Dihidar, S., Calderbank, A., McLaughlin, S., & Merolla, J. (2007). Applications of LDPC codes to the wiretap channel. IEEE Transactions on Information Theory, 53(8), 2933–2945.

    Article  MathSciNet  Google Scholar 

  18. Wyner, A. (1975). The wire-tap channel. Bell System Technical Journal, 54(8), 1355–1387.

    Article  MathSciNet  Google Scholar 

  19. Csiszár, I., & Korner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339–348.

    Article  MathSciNet  Google Scholar 

  20. Subramanian, A., Thangaraj, A., Bloch, M., & McLaughlin, S. (2011). Strong secrecy on the binary erasure wiretap channel using large-girth LDPC codes. IEEE Transactions on Information Forensics and Security, 6(3), 585–594.

    Article  Google Scholar 

  21. Chen, D., Zhang, N., Cheng, N., Zhang, K., Qin, Z., & Shen, X. (2018). Physical layer based message authentication with secure channel codes. IEEE Transactions on Dependable and Secure Computing,. https://doi.org/10.1109/TDSC.2018.2846258.

    Article  Google Scholar 

  22. Fang, X., Zhang, N., Zhang, S., Chen, D., Sha, X., & Shen, X. (2017). On physical layer security: Weighted fractional Fourier transform based user cooperation. IEEE Transactions on Wireless Communications, 16(8), 5498–5510.

    Article  Google Scholar 

  23. Usama, M., Rehman, O., Memon, I., & Rizvi, S. (2019). An efficient construction of key-dependent substitution box based on chaotic sine map. International Journal of Distributed Sensor Networks, 15(12), 1550147719895957.

    Article  Google Scholar 

  24. Zhao, X., Abdo, A., Xu, C., Geng, S., Zhang, J., & Memon, I. (2018). Dimension reduction of channel correlation matrix using CUR-decomposition technique for 3-D massive antenna system. IEEE Access, 6, 3031–3039.

    Article  Google Scholar 

  25. Abdo, A., Zhao, X., Zhang, R., Zhou, Z., Zhang, J., Zhang, Y., et al. (2018). MU-MIMO downlink capacity analysis and optimum code weight vector design for 5G big data massive antenna millimeter wave communication. Wireless Communications and Mobile Computing,. https://doi.org/10.1155/2018/7138232.

    Article  Google Scholar 

  26. Shifa, A., Afgan, M. S., Asghar, M. N., Fleury, M., Memon, I., Abdullah, S., et al. (2018). Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering. IEEE Access, 6, 16189–16206.

    Article  Google Scholar 

  27. Madhusudhan, R., Hegde, M., & Memon, I. (2018). A secure and enhancedelliptic curve cryptography-based dynamic authentication scheme using smart card. International Journal of Communication Systems. https://doi.org/10.1002/dac.3701

    Article  Google Scholar 

  28. Memon, I. (2015). A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wireless Personal Communications, 85(3), 1167–1191.

    Article  Google Scholar 

  29. Memon, I., & Arain, Q. (2017). Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web, 20(4), 639–672.

    Article  Google Scholar 

  30. Melki FN: R., et al. (2018). An efficient OFDM-based encryption scheme using a dynamic key approach. IEEE Internet of Things Journal, 6, 361.

    Article  Google Scholar 

  31. Noura, H., et al. (2018). A physical encryption scheme for low-power wireless M2M devices: a dynamic key approach. Mobile Networks and Applications, 24, 447.

    Article  Google Scholar 

  32. Noura, H., et al. (2018). Efficient and secure physical encryption scheme for low-power wireless M2M devices. In IWCMC security symposium, Limassol: Cyprus

  33. Noura, H., Chehab, A., Sleem, L., Noura, M., Couturier, R., & Mansour, M. M. (2018). One round cipher algorithm for multimedia IoT devices. Multimedia Tools and Applications, 77(14), 18383–18413.

    Article  Google Scholar 

  34. Baldini, G., Giuliani, R., & Dimc, F. (2019). Physical layer authentication of internet of things wireless devices using convolutional neural networks and recurrence plots. Internet Technology Letters, 2(2), e81.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reem Melki.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Noura, H.N., Melki, R., Kanj, R. et al. Secure MIMO D2D communication based on a lightweight and robust PLS cipher scheme. Wireless Netw 27, 557–574 (2021). https://doi.org/10.1007/s11276-020-02468-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-020-02468-z

Keywords

Navigation