SECURITY-AWARE WAVEFORMS FOR ENHANCING WIRELESS COMMUNICATIONS PRIVACY IN CYBER-PHYSICAL SYSTEMS VIA MULTIPATH RECEPTIONS

 

ABSTRACT

Cyber-Physical System (CPS), regarded as the nextgeneration of engineered system, has the capability to interactwith the real physical world. Applications of CPS span variousfields such as medical monitoring, traffic control, and smartgrid. With such widespread applications, privacy assurance isbecoming more and more important since what the CPS connectsare people and the real world. Any leakage of private informationwill cause serious consequences. In this paper, we focus onenhancing the secrecy of wireless communications in CPS byuse of physical layer security techniques. Specifically, we studyan amplify and forward (AF) relay network where all devicesareequipped with a single antenna. We propose a privacy-enhancedwaveform design approach aided by artificial noise (AN) toenhance the communication secrecy in a wireless environmentwith multipath receptions. First, we consider the case with perfecteavesdropper’s channel state information (CSI). We optimizethe AF coefficient for forwarding the information-bearing signaland the AN covariance to maximize the achievable secrecyrate. The optimal solution is obtained by solving a series ofsemidefinite programs (SDPs). Then, a more practical scenariowith imperfect eavesdropper’s CSI is studied. We develop arobust waveform design method and obtain the lower boundof the achievable secrecy rate. Numerical results are presentedto show the effectiveness of our proposed algorithms.

EXISTING SYSTEM:

The basic security requirements of CPS include robust-ness to unpredictable conditions, self-healing capabilities, andappropriate assurances in terms of authentication, integrity,serviceavailability, and non-repudiation of the informationflows. However, different kinds of external maliciousattacks are threatening the security of CPS, such as denial-ofservice(DoS) attack and false-data injection (FDI) attack. Severalresearches have been conducted to defeat specific attacksn specific CPS applications .studiedthe real-time detection of DoS attacks in vehicular networksunder the random jamming attack and on-off jamming attack.In, the optimal FDI attack strategy and the correspondingtwo defense schemes were proposed. In , the authorsstudied the effect of replay attacks on a control system andproposed a detection method.Apart from the aforementioned security requirements, privacyor secrecy is also an essential characteristic of a trustworthyCPS. Privacy issues in CPS mainly refer to the leakage of personalsensitive information. The main reason for informationleakage is that the CPS highly depends on the communicationnetworks and heterogeneous IT elements. Furthermore,the widely used wireless communications in CPS make theconfidential information much more vulnerable to eavesdroppingattack. The traditional anti-eavesdropping strategy isbased on the cryptographic encryption. However, withthe enhancement of eavesdroppers’ computing capabilities, theencryption method faces an increasing risk of informationleakage. Moreover, the management and distribution of thesecret keys often require complex protocols and architectures,which makes the cryptographic method difficult to be appliedin the CPS especially the Internet of Things (IoT) withdistributed resource-constrained devices

PROPOSED SYSTEM:

In this paper, we concentrate on the confidential messagetransmission from a source (e.g., wearable medical device) to adestination (e.g., doctor’s smartphone) in a medical CPS. Dueto the lack of direct source-destination link, one pre-selectedrelay is employed to help forward the message. During thetransmission, an eavesdropper is attempting to extract thisconfidential message. We try to enhance the security of thisrelay network by performing security-aware waveform design.Unlike, we consider a more practical scenario wherethe destination uses the maximum ratio combining (MRC)receiver, the complexity of which is much lower than theminimum mean square error (MMSE) receiver in [39]. What’smore, we also study the robust waveform design with imperfecteavesdropper’s channel state information (CSI).the maincontributions of this paper can be summarized as follows:1) The secure relay-aided SISO transmission is studied interms of waveform design for the first time. The relay usesan AN-aided amplify-and-forward (AF) protocol to forwardthe confidential message.2) With perfect CSIs of legitimate links and the eavesdroppinglink, we optimize the AF coefficient for informationbearingsignal and the AN covariance to maximize theachievable secrecy rate. The optimal solution is obtainedthrough convex optimization.3) With imperfect CSI of the eavesdropping link, to make theproblem tractable we enlarge the space of estimation errorwhich strengthens the CSI uncertainty constraint. Then wetransform the secrecy rate maximization problem into asemidefinite program (SDP) and obtain the optimal robustAF coefficient and AN covariance. Since the uncertaintyconstraint has been strengthened, the maximum achievablesecrecy rate after optimization is actually the lower boundof the original problem.

CONCLUSIONS

Although CPS is expected to produce enormous economicbenefits, it is vulnerable to many kinds of malicious attacksdue to the employment of communication networks. Athese attacks, privacy is becoming a very critical issue sincewhat the CPS connects is the real physical world and thusany information leakage will cause serious consequences. Westudied the privacy-enhanced waveform design method for aSISO relay network with multipath receptions. Specifically, weproposedan AN-AF strategy which required the relay to forwardthe source message and inject artificial noise at the sametime. We first studied the case with perfect eavesdropper’sCSI. The AF coefficient for forwarding information-bearingsignal and the AN covariance were optimized to maximizethe achievable secrecy rate. We obtained the optimal solutionby using a one-dimensional search and solving a series ofSDPs. Then, we considered a more practical scenario wherethere exists channel estimation error for eavesdropper’s CSI.Totackle this problem, we enlarged the estimation error spaceand then obtained the lower bound of the achievable secrecyrate. Numerical examples were presented to show the performancesof the proposed schemes under different simulationenvironments. Simulation results demonstrate that although theinjectedAN will cause interference to the legitimate user, itis still helpful for increasing secrecy rate.

REFERENCES

[1] Q. Shafi, “Cyber physical systems security: A brief survey,” in Proc.Computational Science and Its Applications (ICCSA), Jun. 2012, pp.146–150.

[2] Q. Du, W. Zhao, W. Li, X. Zhang, B. Sun, H. Song, P. Ren, L. Sun, andY. Wang, “Massive access control aided by knowledge-extraction for coexistingperiodic and random services over wireless clinical networks,”J. Med. Syst., vol. 40, no. 7, pp. 1–8, Jul. 2016.

[3] Z. Su, Q. Xu, H. Zhu, and Y. Wang, “A novel design for content deliveryover software defined mobile social networks,” IEEE Network, vol. 29,no. 4, pp. 62–67, Jul. 2015.

[4] W. Wolf, “News briefs,” Computer, vol. 40, no. 11, pp. 104–105, Nov.2007.

[5] H. Kagermann, W. Wahlster, and J. Helbig, “Secure the future ofGerman manufacturing industry: Recommendations for implementingthe strategic initiative Industrie 4.0,” Final report of the Industrie 4.0Working Group, Frankfurt, Tech. Rep., Apr. 2013.

[6] H. Song, D. Rawat, S. Jeschke, and C. Brecher, Cyber-Physical Systems:Foundations, Principles and Applications. Boston, MA: AcademicPress, 2016.

[7] S. Jeschke, C. Brecher, H. Song, and D. Rawat, Industrial Internet ofThings. Cham, Switzerland: Springer, 2017.

[8] H. Li, L. Lai, and H. V. Poor, “Multicast routing for decentralized controlof cyber physical systems with an application in smart grid,” IEEE J.Sel. Areas Commun., vol. 30, no. 6, pp. 1097–1107, Jul. 2012.

[9] X. Li, C. Qiao, X. Yu, A. Wagh, R. Sudhaakar, and S. Addepalli,“Toward effective service scheduling for human drivers in vehicularcyber-physical systems,” IEEE Trans. Parallel Distrib. Syst., vol. 23,no. 9, pp. 1775–1789, Sep. 2012.

[10] Z. Wang, H. Song, D. W. Watkins, K. G. Ong, P. Xue, Q. Yang, andX. Shi, “Cyber-physical systems for water sustainability: challenges andopportunities,” IEEE Commun. Mag., vol. 53, no. 5, pp. 216–222, May2015.

[11] S. Li, T. Tryfonas, G. Russell, and P. Andriotis, “Risk assessment for