Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming

@article{Fan2018SecretFocusAP,
  title={Secret-Focus: A Practical Physical Layer Secret Communication System by Perturbing Focused Phases in Distributed Beamforming},
  author={Xiaoran Fan and Zhijie Zhang and Wade Trappe and Yanyong Zhang and Richard E. Howard and Zhu Han},
  journal={IEEE INFOCOM 2018 - IEEE Conference on Computer Communications},
  year={2018},
  pages={1781-1789}
}
Ensuring confidentiality of communication is fundamental to securing the operation of a wireless system, where eavesdropping is easily facilitated by the broadcast nature of the wireless medium. By applying distributed beamforming among a coalition, we show that a new approach for assuring physical layer secrecy, without requiring any knowledge about the eavesdropper or injecting any additional cover noise, is possible if the transmitters frequently perturb their phases around the proper… 

Poster abstract: A practical secret communication system by perturbing focused phases among distributed transmitters

This work shows that a new approach for assuring physical layer secrecy, without requiring any knowledge about the eavesdropper or injecting any additional cover noise, is possible if the transmitters frequently perturb their phases around the proper alignment phase while transmitting messages.

Demo abstract: A practical secret communication system by perturbing focused phases among distributed transmitters

This work shows that a new approach for assuring physical layer secrecy, without requiring any knowledge about the eavesdropper or injecting any additional cover noise, is possible if the transmitters frequently perturb their phases around the proper alignment phase while transmitting messages.

Facilitating the Deployment of Next Billion IoT Devices with Distributed Antenna Systems

  • Xiaoran Fan
  • Computer Science
    The ACM MobiSys 2019 on Rising Stars Forum - RisingStarsForum'19
  • 2019
The feasibility of using distributed antenna systems to facilitate the deployment of IoT devices is discussed and the preliminary results demonstrate that this energy ball has a great potential to be leveraged to solve many fundamental problems in IoT and enable exciting IoT applications.

Towards flexible wireless charging for medical implants using distributed antenna system

In-N-Out can continuously charge a medical implant residing in deep tissues at near-optimal beamforming power, even when the implant moves around inside the human body, and is sufficient to wirelessly power a range of commercial medical devices.

Pushing the Range Limits of Commercial Passive RFIDs

PushID is presented, a system that exploits collaboration between readers to enhance the range of commercial passive RFID tags, without altering the tags whatsoever, and resolves the chicken-or-egg problem of inferring the optimal beamforming parameters to beam energy to a tag without any feedback from the tag itself.

Energy-Ball

This paper presents a new power transfer approach by aligning the phases of a collection of radio frequency energy chargers at the target receiver device, referred to as Energy-Ball, which can ship energy over tens of meters and to mobile targets.

Enabling Concurrent IoT Transmissions in Distributed C-RAN

A distributed C-RAN is built which has tens of distributed radio frontends using USRP N210s in a 20 × 20 × 3 m3 area and can potentially decode collided signals from low-end IoT devices with all signal processing been done on the cloud.

C-Cube

It is argued that by deploying a lightweight beamforming helper, this paper can push the limit of CSI estimation with negligible overhead on the tag and propose C-Cube, a concurrent charging system for backscatter networks.

References

SHOWING 1-10 OF 20 REFERENCES

QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach

This paper proposes a secret transmit beamforming approach using a quality-of-service (QoS)-based perspective, and proves that SDR can exactly solve the design problems for a practically representative class of problem instances; e.g., when the intended receiver's instantaneous CSI is known.

Guaranteeing Secrecy using Artificial Noise

  • S. GoelR. Negi
  • Computer Science
    IEEE Transactions on Wireless Communications
  • 2008
This paper considers the problem of secret communication between two nodes, over a fading wireless medium, in the presence of a passive eavesdropper, and assumes that the transmitter and its helpers (amplifying relays) have more antennas than the eavesdroppers.

Improving Wireless Physical Layer Security via Cooperating Relays

Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or minimize the transmit powersubject to a secrecy rate constraint.

Wireless Physical-Layer Security: Lessons Learned From Information Theory

An overview of research results in information-theoretic security with multiple wireless transmitters is provided, and distilling insights for designing wireless systems with confidentiality guarantees are focused on.

Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks

In this paper, we address the security of a two-way relay network in the presence of an eavesdropper, where each node is only equipped with single antenna. We propose two-phase distributed analog

Achieving Secret Communication for Fast Rayleigh Fading Channels

The key factor that enables secret communication in this case is that both M-QAM and artificial noise limit the leakage of information when Eve's channel is unusually good.

Securing Wireless Communications at the Physical Layer

The book focuses on physical layer security, an emerging field of research that has seen an explosion of research in the past few years and is only expected to continue as there is a growing need to secure wireless communications without conventional cryptographic network security protocols.

On the Secrecy Rate of Multi-Antenna Wiretap Channel under Finite-Alphabet Input

This work investigates the effect of limiting source signals to finite-alphabet on the secrecy rate of a multi-antenna wiretap system and concludes that results from Gaussian inputs serve as upper-bound of secrecy rate for practical systems with finite alphabet inputs.

Distributed Beamforming using 1 Bit Feedback : from Concept to Realization

It is shown that the mathematical model gives accurate predictions for the convergence rate in static an d time-varying channels, and use the analysis to demonstrate the scalability of the algorithm.

Exploiting the physical layer for enhanced security [Security and Privacy in Emerging Wireless Networks]

It is argued that new security paradigms which exploit physical layer properties of the wireless medium, such as the rapid spatial, spectral, and temporal decorrelation properties ofThe radio channel, can enhance confidentiality and authentication services.