Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Time-varying Metamaterial-enabled Directional Modulation Schemes for Physical Layer Security in Wireless Communication Links

Published: 13 October 2022 Publication History
  • Get Citation Alerts
  • Abstract

    Novel transmission schemes, enabled by recent advances in the fields of metamaterial (MTM), leaky-wave antenna (LWA) and directional modulation (DM), are proposed for enhancing the physical layer (PHY) security. MTM-LWAs, which offer compact, integrated, and cost-effective alternatives to the classic phased-array architectures, are particularly of interest for emerging wireless communication systems including Internet-of-Things. The proposed secure schemes are devised to accomplish the functionalities of directional modulation (DM) transmitters for orthogonal frequency-division multiplexing (OFDM) and non-contiguous OFDM transmissions, while enjoying the implementation benefits of MTM-LWAs. Specifically, transmitter architectures based on the idea of time-modulated MTM-LWA have been put forth as a promising solution for PHY security for the first time. The PHY security for the proposed schemes are investigated from the point of view of both passive and active attacks where an adversary aims to decode secret information and feed spurious data to the legitimate receiver, respectively. Numerical simulations reveal that even when the adversary employs sophisticated state-of-the-art deep learning based attacks, the proposed transmission schemes are resistant to these attacks and reliably guarantee system security.

    References

    [1]
    1998. Planar and Circular Array Pattern Synthesis. John Wiley & Sons, Ltd., 106–126.
    [2]
    2005. Radiated-Wave Applications. John Wiley & Sons, Ltd, 261–315.
    [3]
    A. Babakhani, D. B. Rutledge, and A. Hajimiri. 2009. Near-field direct antenna modulation. IEEE Microw. Mag. 10, 1 (2009), 36–46.
    [4]
    P. Baccarelli, P. Burghignoli, F. Frezza, A. Galli, and P. Lampariello. 2003. Novel modal properties and relevant scanning behaviors of phased arrays of microstrip leaky-wave antennas. IEEE Trans. Antenn. Propag. 51, 12 (2003), 3228–3238.
    [5]
    Bigthink. 2016. Hacking the Human Heart. Retrieved from http://bigthink.com/future-crimes/hacking-the-human-heart.
    [6]
    Buisnessinsider. 2015. The Most Hackable Cars on the Road. Retrieved from http://www.businessinsider.com/the-most-hackable-cars-on-the-road-today-2015-8.
    [7]
    Christopher P. Burgess, Irina Higgins, Arka Pal, Loïc Matthey, Nick Watters, Guillaume Desjardins, and Alexander Lerchner. 2018. Understanding disentangling in \( \beta \) -VAE. CoRR abs/1804.03599 (2018).
    [8]
    C. Caloz and T. Itoh. 2004. Array factor approach of leaky-wave antennas and application to 1-D/2-D composite right/left-handed (CRLH) structures. IEEE Microw. Wireless Compon. Lett. 14, 6 (2004), 274–276.
    [10]
    Michael P. Daly and Jennifer T. Bernhard. 2009. Directional modulation technique for phased arrays. IEEE Trans. Antenn. Propag. 57, 9 (2009), 2633–2640.
    [11]
    Y. Ding, V. Fusco, J. Zhang, and W. Q. Wang. 2019. Time-Modulated OFDM directional modulation transmitters. IEEE Transact. Vehic. Technol. 68, 8 (2019), 8249–8253.
    [12]
    M. Hafez, M. Yusuf, T. Khattab, T. Elfouly, and H. Arslan. 2018. Secure spatial multiple access using directional modulation. IEEE Trans. Wireless Commun. 17, 1 (2018), 563–573.
    [13]
    S. Hara and R. Prasad. 1997. Overview of multicarrier CDMA. IEEE Commun. Mag. 35, 12 (1997), 126–133.
    [14]
    David R. Jackson and Arthur A. Oliner. 2008. Leaky-Wave Antennas. John Wiley & Sons, Ltd., 325–367.
    [15]
    Diederik P. Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. Retrieved from http://dblp.uni-trier.de/db/journals/corr/corr1412.html#KingmaB14.
    [16]
    Diederik P. Kingma and Max Welling. 2014. Auto-Encoding variational Bayes. In Proceedings of the International Conference on Learning Representations (ICLR’14).
    [17]
    Qun Li, Yonghong Zhang, and Chung-Tse Michael Wu. 2018. Noncontact vital sign detection using 24GHz two-dimensional frequency scanning metamaterial leaky wave antenna array. In Proceedings of the IEEE/MTT-S International Microwave Symposium (IMS’18). IEEE, 255–258.
    [18]
    Chunchi Lu, Yichao Yuan, Chao-Hsiung Tseng, and Chung-Tse Michael Wu. 2019. Multi-target continuous-wave vital sign radar using 24 GHz metamaterial leaky wave antennas. In Proceedings of the IEEE MTT-S International Microwave Biomedical Conference (IMBioC’19), Vol. 1. IEEE, 1–4.
    [19]
    Lu Tan and Neng Wang. 2010. Future internet: The internet of things. In Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE’10), Vol. 5. V5–376–V5–380.
    [20]
    Y. Luo, K. Qin, H. Ke, B. Xu, S. Xu, and G. Yang. 2021. Active metamaterial antenna with beam scanning manipulation based on a digitally modulated array factor method. IEEE Trans. Antenn. Propag. 69, 2 (2021), 1198–1203.
    [21]
    A. Nooraiepour, W. U. Bajwa, and N. B. Mandayam. 2021. Learning-Aided physical layer attacks against multicarrier communications in IoT. IEEE Trans. Cogn. Commun. Netw. 7, 1 (2021), 239–254.
    [22]
    Alireza Nooraiepour, Kenza Hamidouche, Waheed U. Bajwa, and Narayan Mandayam. 2018. How secure are multicarrier communication systems against signal exploitation attacks? In Proceedings of the IEEE Military Communications Conference (MILCOM’18). 201–206.
    [23]
    A. Punchihewa, Q. Zhang, O. A. Dobre, C. Spooner, S. Rajan, and R. Inkol. 2010. On the cyclostationarity of OFDM and single carrier linearly digitally modulated signals in time dispersive channels: Theoretical developments and application. IEEE Trans. Wireless Commun. 9, 8 (August 2010), 2588–2599.
    [24]
    B. Qiu, L. Wang, J. Xie, Z. Zhang, Y. Wang, and M. Tao. 2020. Multi-Beam index modulation with cooperative legitimate users schemes based on frequency diverse array. IEEE Trans. Vehic. Technol. 69, 10 (2020), 11028–11041.
    [25]
    Rakesh Rajbanshi, Alexander M. Wyglinski, and Gary J. Minden. 2006. An efficient implementation of NC-OFDM transceivers for cognitive radios. In Proceedings of the 1st International Conference on Cognitive Radio Oriented Wireless Networks and Communications. 1–5.
    [26]
    Sina Rezaei Aghdam, Alireza Nooraiepour, and Tolga M. Duman. 2019. An overview of physical layer security with finite-alphabet signaling. IEEE Commun. Surv. Tutor. 21, 2 (2019), 1829–1850.
    [27]
    Mehdi Salarkaleji, Mohammad Ashraf Ali, and Chung-Tse Michael Wu. 2016. Two-dimensional full-hemisphere frequency scanning array based on metamaterial leaky wave antennas and feed networks. In Proceedings of the IEEE MTT-S International Microwave Symposium (IMS’16). IEEE, 1–4.
    [28]
    Mehdi Salarkaleji, Mohammadreza Eskandari, Jimmy Ching-Ming Chen, and Chung-Tse Michael Wu. 2017. Frequency and polarization-diversified linear sampling methods for microwave tomography and remote sensing using electromagnetic metamaterials. Electronics 6, 4 (2017), 85.
    [29]
    T. M. Schmidl and D. C. Cox. 1997. Robust frequency and timing synchronization for OFDM. IEEE Trans. Commun. 45, 12 (1997), 1613–1621.
    [30]
    F. Shu, T. Shen, L. Xu, Y. Qin, S. Wan, S. Jin, X. You, and J. Wang. 2020. Directional modulation: A physical-layer security solution to B5G and future wireless networks. IEEE Netw. 34, 2 (2020), 210–216.
    [31]
    Rashmi Sharan Sinha, Yiqiao Wei, and Seung-Hoon Hwang. 2017. A survey on LPWA technology: LoRa and NB-IoT. ICT Express (2017), 14–21.
    [32]
    Gokul Sridharan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, and Sastry Kompella. 2016. Physical-layer security of NC-OFDM-based systems. In Proceedings of the IEEE Military Communications Conference (MILCOM’16). 1101–1106.
    [33]
    Chung-Tse Michael Wu, Yuandan Dong, Jim S. Sun, and Tatsuo Itoh. 2012. Ring-resonator-inspired power recycling scheme for gain-enhanced distributed amplifier-based CRLH-transmission line leaky wave antennas. IEEE Trans. Microw. Theory Techn. 60, 4 (2012), 1027–1037.
    [34]
    L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe. 2008. Using the physical layer for wireless authentication in time-variant channels. IEEE Trans. Wireless Commun. 7, 7 (2008), 2571–2579.
    [35]
    L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe. 2009. Channel-based spoofing detection in frequency-selective rayleigh channels. IEEE Trans. Wireless Commun. 8, 12 (December 2009), 5948–5956.
    [36]
    L. Xiao, A. Reznik, W. Trappe, C. Ye, Y. Shah, and N. Mandayam. 2010. PHY-Authentication protocol for spoofing detection in wireless networks. In Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM’10). 1–6.
    [37]
    Yichao Yuan, Chunchi Lu, Austin Ying-Kuang Chen, Chao-Hsiung Tseng, and Chung-Tse Michael Wu. 2019. Multi-target concurrent vital sign and location detection using metamaterial-integrated self-injection-locked quadrature radar sensor. IEEE Trans. Microw. Theory Techn. 67, 12 (2019), 5429–5437.

    Cited By

    View all
    • (2024)Spatial-Spectral Mapping Beamspace MIMO Receiver Enabled by a Programmable Space-Time-Modulated Metamaterial Antenna2024 IEEE/MTT-S International Microwave Symposium - IMS 202410.1109/IMS40175.2024.10600194(931-934)Online publication date: 16-Jun-2024
    • (2024)Functional metamaterials for wireless antenna applications – A review abetted with patent landscape analysisHeliyon10.1016/j.heliyon.2024.e3402210:13(e34022)Online publication date: Jul-2024
    • (2023)Directional Modulation Retrodirective Array-Enabled Physical Layer Secured Transponder for Protected Wireless Data Acquisition2023 IEEE/MTT-S International Microwave Symposium - IMS 202310.1109/IMS37964.2023.10188157(1180-1183)Online publication date: 11-Jun-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Journal on Emerging Technologies in Computing Systems
    ACM Journal on Emerging Technologies in Computing Systems  Volume 18, Issue 4
    October 2022
    429 pages
    ISSN:1550-4832
    EISSN:1550-4840
    DOI:10.1145/3563906
    • Editor:
    • Ramesh Karri
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 13 October 2022
    Online AM: 23 March 2022
    Accepted: 21 January 2022
    Revised: 03 November 2021
    Received: 28 April 2021
    Published in JETC Volume 18, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Physical layer security
    2. directional modulation
    3. deep learning
    4. metamaterial antennas
    5. internet-of-things

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • National Science Foundation (NSF)

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)153
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Spatial-Spectral Mapping Beamspace MIMO Receiver Enabled by a Programmable Space-Time-Modulated Metamaterial Antenna2024 IEEE/MTT-S International Microwave Symposium - IMS 202410.1109/IMS40175.2024.10600194(931-934)Online publication date: 16-Jun-2024
    • (2024)Functional metamaterials for wireless antenna applications – A review abetted with patent landscape analysisHeliyon10.1016/j.heliyon.2024.e3402210:13(e34022)Online publication date: Jul-2024
    • (2023)Directional Modulation Retrodirective Array-Enabled Physical Layer Secured Transponder for Protected Wireless Data Acquisition2023 IEEE/MTT-S International Microwave Symposium - IMS 202310.1109/IMS37964.2023.10188157(1180-1183)Online publication date: 11-Jun-2023
    • (2023)Programming nonreciprocity and harmonic beam steering via a digitally space-time-coded metamaterial antennaScientific Reports10.1038/s41598-023-34195-813:1Online publication date: 5-May-2023
    • (2023)Programming Wireless Security Through Learning‐Aided Spatiotemporal Digital Coding Metamaterial AntennaAdvanced Intelligent Systems10.1002/aisy.2023003415:10Online publication date: Aug-2023
    • (2022)Metamaterial-Enabled 2D Directional Modulation Array Transmitter for Physical Layer Security in Wireless Communication Links2022 IEEE/MTT-S International Microwave Symposium - IMS 202210.1109/IMS37962.2022.9865545(595-598)Online publication date: 19-Jun-2022

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media