The present disclosure relates to a first communication device and method for use in a wireless communication system to communicate with a second communication device in a secure manner.
Secure messaging between an information sender and an intended recipient is one of the fundamental challenges in communication systems. In order to not let information pass to an unintended recipient (an adversary or eavesdropper), care must be taken to control the environment and/or cryptographically secure the information so that only the intended recipient is able to understand the information transmitted. Cryptographic approaches usually operate on upper layers of the transmission protocol. Once the signal is intercepted on a lower layer, such as PHY layer (over the medium, such as RF waves), brute force decryption may be possible, especially when the packet lengths and encryption keys are relatively short. This is especially true for Internet of Things (IOT) applications, in which typically only a few bits or bytes may be transmitted. Thus, PHY layer security has been considered as an additional means to protect the signal already on PHY layer.
In a wireless communication system, all participants (hereinafter also called communication devices) share the same communication medium and are able to listen (or eavesdrop) on any communication within receive range. According to conventional approaches, information that shall not be shared with all potential recipients might be encrypted using keys exclusively known to the sender and receiver. One way to establish those keys is to derive them from a pre-shared secret (also known as the network password) given to legitimate participants for association with the network. Unless further measures are taken, all participants are then able to decrypt information from any other participant that is part of the network. To mitigate the problem of potential “eavesdropping” of sensitive information, concepts for Point-to-Point encryption for such networks exist. Nevertheless, an exchange of an encryption key is required to establish a secure communication link. A common solution is implemented in the Extensible Authentication Protocol (EAP), which is used in the context of IEEE 802.11 wireless LANs to exchange keys. The handshake procedure that takes place in the set-up phase of such a secure connection is still sensitive, and if it is eavesdropped, all subsequent communication can be decrypted and captured by a potential eavesdropper.
The “background” description provided herein is for the purpose of generally presenting the context of the disclosure. Work of the presently named inventor(s), to the extent it is described in this background section, as well as aspects of the description which may not otherwise qualify as prior art at the time of filing, are neither expressly nor impliedly admitted as prior art against the present disclosure.
It is an object to provide a communication device that can detect the presence of a potential eavesdropper. It is a further object of an embodiment to use this information to prevent or at least make it more difficult that a potential eavesdropper can actually eavesdrop on the communication between a first communication device and a second communication device. It is a further object to provide corresponding communication method as well as a corresponding computer program and a non-transitory computer-readable recording medium for implementing said communication method.
According to an aspect there is provided a first communication device for use in a wireless communication system to communicate with a second communication device, the first communication device comprising circuitry configured to
According to a further aspect there is provided a first communication method of a first communication device for use in a wireless communication system to communicate with a second communication device, the first communication method comprising
According to still further aspects a computer program comprising program means for causing a computer to carry out the steps of the method disclosed herein, when said computer program is carried out on a computer, as well as a non-transitory computer-readable recording medium that stores therein a computer program product, which, when executed by a processor, causes the method disclosed herein to be performed are provided.
Embodiments are defined in the dependent claims. It shall be understood that the disclosed communication method, the disclosed computer program and the disclosed computer-readable recording medium have similar and/or identical further embodiments as the claimed communication device and as defined in the dependent claims and/or disclosed herein.
In contrast to wired networks, where all network participants are (quasi-) statically connected to the medium, wireless communication systems broadcast their message to everyone in a certain proximity, depending on the propagation characteristics of the underlying radio frequencies. To mitigate this, wireless communication networks provide the option to exploit spatial properties like directivity, especially for higher frequencies. Additionally, the wireless medium and its properties are dependent on multiple parameters like position and orientation of devices, time, etc. According to embodiments of the present disclosure, one or more of these properties are used in order to increase security of the exchange of information between a first and a second communication device and thus to decrease the probability of eavesdropping by a third communication device (i.e., a potential eavesdropper) in a wireless communication system (such as a wireless LAN network), especially in the 60 GHz (or mmWave) frequency spectrum, or in a similar spectrum such as e.g., 28 GHz, which is used for 5G cellular communication.
For this purpose, the positions of potential eavesdroppers are determined by evaluating the echoes received in response to the transmission of probe signals. Additionally, in some embodiments a corresponding evaluation by the second communication device (the communication partner) may take place. This is not strictly required, as the communication partner usually collaborates with the first communication device during a beam training phase, and thus the direction of a second communication device relative to the first communication device is already known. Based on the position information of potential eavesdroppers, the transmission of the desired message may in one embodiment be controlled with the aim that the second communication device but not the potential eavesdropper can receive it. In one embodiment, additionally or alternatively, artificial noise (also called jamming signals) may be transmitted to locally jam the potential eavesdropper, i.e. the transmission of the artificial noise may be controlled such that the potential eavesdropper receives the message and artificial noise and thus cannot decode the message, while the second communication device still can successfully receive and decode the message. In this way the probability that a third communication device (the potential eavesdropper) can eavesdrop on the communication between the first communication device and the second communication device is much reduced or even minimized.
It shall be noted that determining the position of a device shall be understood in the context of the present disclosure such that at least the direction in which the device (e.g. the second communication device or the potential eavesdropper) is arranged with respect to another device (e.g. the first communication device) is determined. It is not required that the (exact) two- or three-dimensional (absolute or relative) position of the device is determined.
The foregoing paragraphs have been provided by way of general introduction, and are not intended to limit the scope of the following claims. The described embodiments, together with further advantages, will be best understood by reference to the following detailed description taken in conjunction with the accompanying drawings.
A more complete appreciation of the disclosure and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
In conventional communication systems, usually a single link between a transmitter and a receiver and its properties is the objective of engineering. The typical metric to characterize the upper bound of communication throughput of these systems is the Shannon capacity, measured in bit per second per Hertz or bit per channel use (bpcu). The Shannon capacity (in the following assuming an additive white Gaussian noise channel model (AWGN)) can be determined based on the received signal to noise ratio (SNR) according to:
with signal power S, and noise power N. The signal to noise ratio (S/N) is usually (in linear systems) proportional to the transmit power PTX. Usually, a communication system is designed in a way that C is maximized, assuming a single information source A and a single information sink B are involved.
Assuming that another information sink E exists (also called “wire-tapper” or “Eve” for eavesdropper) that can eavesdrop the signals transmitted by A, this can be considered as a secrecy system. In order to quantify the secrecy of the system, a commonly known metric is the so called secrecy rate (SR) CS that is defined as the difference between achievable rate of “A to B” and achievable rate of “A to E”:
C
S
=C(SNRA)−C(SNRE)
A simple visualization of this relation is shown in
In practical communication systems, the full Shannon capacity can never be reached (limited A/D resolution, finite complexity, . . . ). Therefore the secrecy rate shown in
with E[.] being the expectation operator and P(.) being a conditional probability. Based on the CM capacity, a more realistic CM secrecy rate can be defined that is visualized for a 4-QAM constellation in
C
S,cm
=C
cm(SNRA)−Ccm(SNRE)
Another metric that can be used to define the secrecy rate is the bit interleaved coded modulation (BICM) capacity, taking into account additional practical limitations of communication systems. Still, it is obvious that the highest CM secrecy rate can be achieved when SNRA is high and SNRE is low. But in contrast to the secrecy rate shown in
In a typical scenario, the SNR of A and E are not independent, but both proportional to the transmit power that is used by A. Thus, a coupled CM secrecy rate can be defined by introducing an attenuation factor a defining the SNR-offset between A and E:
SNRA|dB=PTX|dBm−PL|dB−PN,A|dBm
SNRE|dB=SNRA|dB+a|dB
with transmit power PTX, path loss PL noise power at A/E PN,A/E and attenuation factor a. It shall be noted that PRX|dBm=PTX|dBm−PL|dB defines the received signal power taking into account the path loss PL|dB, which can be treated as a constant offset and is thus not further considered in the context of this disclosure. Thus, it is defined: PL|dB=0 dB. Using this definition, it can be shown that there exists an optimum PTX for each combination of a and x that maximizes CS, cm. This relation is visualized for an explanatory set of x and a in
Thus, for a secure communication system, an optimization goal can be defined in order to provide the highest possible CM secrecy rate:
max{CS,cm(PTX,χ,a)}
Additionally, it might be considered to maximize the above mentioned metric under the additional constraint of a specific minimal communication rate/capacity Ctarget, resulting in the following constrained optimization problem:
max{CS,cm(PTX,χ,a)} with Ccm(PTX,χ,a)≥Ctarget
Another formulation might target minimization of the eavesdropper's rate/capacity:
min{Ccm,E(PTX,χ,a)} with Ccm,A(PTX,χ,a)≥Ctarget
Besides the above-mentioned theoretic aspects on security, in implementations of communication systems, data is usually protected by Forward Error Correcting Codes (FECs) in order to make the transmission more robust against effects of noise or interference. These codes are usually designed in order to minimize the probability of bit errors in the received message (bit error rate (BER)) for a given SNR or SNR range (or channel conditions in general). Designing these codes with respect to maximizing the above-mentioned metrics is another approach to enhance physical layer security.
In order to reach this goal an approach will be described in the following that aims to influence the three parameters PTx, χ and a specifically for mmWave communication systems.
The above-introduced metric for secrecy provides one possible perspective on the problem of providing secrecy in a communication system. Other possible metrics include:
Based on the used secrecy metric, multiple methods are generally available by which a station (STA) and access point (AP) can utilize spatial diversity to prevent other stations, like stations within the same network sharing the same cryptographic secret, to eavesdrop on communication between the station and the access point. The same method may also be used for direct communication between two stations or in other communications systems, besides WLAN.
High frequency wireless communication such as 60 GHz WLAN use directional wave radiation (beams) between the transmitter (TX) and receiver (RX) to cover even medium distances because omnidirectional radiation patterns, as used for lower frequencies, are subject to strong attenuation. Hence, two communication partners, such as a STA and AP, use beamforming antenna configurations that are learned initially and continuously updated to changing conditions such as displacement or blockage. Intuitively, the best communication path between both parties would be the transmit and receive beams directed on a straight line towards each other (line of sight, LoS). However, in typical situations there will be reflections that form indirect paths between the sender and receiver, and it may as well be that the direct path is not the best performing path due to obstacles/materials to be penetrated. But in any case, if communication is at all possible, there may be an ensemble of beam configurations (or sub-streams) that, if some or all of them are used together, provides the potential of a spatially diverse communication method. It can be shown that, if using a sufficient number of reflective path components, there is little to zero potential for an eavesdropper device to be in a position where it is able to receive the same complete superposition of sub-streams as the legitimate receiver, simply because it cannot be in the same position where all sub-streams are decodable into the full information set.
The following embodiments of the present disclosure might be applied either separately or in combination in order to enhance the secrecy of a communication system. As overall goal can be formulated that the embodiments are directed to detecting the presence and position of a potential eavesdropper. This information may then optionally be used to reduce (or even minimize) eavesdropping probability, and preferably optimizing (or even maximizing) the secrecy rate SR.
For instance, secrecy rate may be considered as a metric, in which case the security criterion shall be maximized (which may be formulated as max of {Secrecy Rate/CM SR/BICM SR} or min of {bit error rate at eavesdropper}) such that the probability of eavesdropping by a third device is minimized. Other forms of security metric/criteria can be used, such as minimization of bit error rate (BER) at the eavesdropper.
As shown in
In mmWave communications, usually both communication devices are equipped with PAAs, resonating at the corresponding frequency band. An electromagnetic wave impinging on a surface of an antenna interacts with the antenna structure based on two scattering phenomena: The first scattering is the so-called structural mode scattering which appears due to the metal conductor of the antenna. The remaining part of the power is actually fed into the antenna connector, where an impedance mismatch is reflecting a part of the energy back into the radiating part of the antenna, where the signal is then radiated again. This phenomenon is called antenna mode scattering.
In radio detection and ranging (RADAR) applications, a radar antenna transmits a signal into different directions and receives echoes of this signal reflected by a “target”. The amount of signal power PRX that is reflected is usually modeled by means of the so-called radar cross-section (RCS) σ. The amount of received signal power can thus be modeled by:
with
The higher σ is, and the lower the distance to the reflecting device, the higher is the power of the echo signal that can be detected at the receiver antenna.
In the context of antennas, the amount of electric field reflected from a receiving antenna structure (scattered or re-radiated) can be separated into two distinct parts:
i) Antenna mode scattering, which depends from the antenna gain G, the matched or unmatched load ZL that is attached to the antenna network, as well as other antenna parameters like polarization or angle of arrival.
ii) Residual mode scattering (or structural component of the RCS), which describes any other contributions that cannot be assigned to the first category in order to give a full description of the total radar cross-section of an antenna structure. Those components in general can depend on all parameters like the antennas structure, used materials, etc. but by definition it does not depend on the load impedance ZL that is attached to the output port of the antenna.
Antenna mode scattering and residual mode scattering can cause an increase of the radar cross-section of a 60 GHz capable WLAN device that is able to “listen” into the direction of the transmitter dynamically. These effects can be combined and modeled with the radio cross-section of the antenna.
Further, the RCS of any “target” depends on the frequency of the signals used by the sender to generate the echoes. The actual frequency dependency as well as the estimated value of the RCS may be used to classify targets into categories like antenna device/potential eavesdropper or passive scatterer/obstacle. This can be done by matching the frequency dependent echo signal (spectrum) of a detected target to a set of known spectra (e.g. by means of correlation or other distance or similarity metrics).
Further, one or more these properties may be used by a first communication device in order to distinguish between different devices. In particular, a communication device may use the estimated RCS and its frequency dependent characteristic as some sort of signature and thus may be able to detect if a potential eavesdropper pretends to be a legitimate recipient.
In a preferred embodiment for WLAN in the 60 GHz band, analog beams, which are tested during analog beam training, can be used as probe signals. This is part of a sector level sweep (SLS) phase, or subsequent beam refinement. Such directed beams may be used subsequently as probe signals to detect the presence of a potential eavesdropper E. It is not required to cover a 360° around the transmitter, to detect a potential eavesdropper, because subsequent communication between transmitter and intended receiver (A and B) will only take place over one of the previously tested beams (i.e. an eavesdropper may be located on a blind spot, being undetected, but no signals are transmitted towards this spot/area).
It may be assumed that transmitter A knows the position of intended receiver B. This can be accomplished, e.g., as a byproduct of SLS and beam refinement phase, in which A and B both participate. Angle of departure (AoA) from A towards B is known at A (either hardwired or estimated from the phase settings at the phased antenna array (PAA)) for each tested beam direction (probe signal). Other known positioning techniques such as state-of-are fine time measurement (to estimate and signal time of flight information from A to B as well as Angle of Arrival (AoA) at receiver B) can further improve positioning of B. At least the direction in which B is located (without knowing the distance) is sufficient for most of the countermeasures, after detecting a potential eavesdropper.
After establishing a communication link between A and B with known position of B (or at least the direction of B), probe signals originating from A will scan for the location of a potential eavesdropper. Once a reflection of a probe signal arrives back at A, A may mark this direction as a potential eavesdropper direction. It may have also been the reflection from an object or a non-malicious device (having no intention of eavesdropping), but for security reasons, the origin of this reflection may be marked as a potential eavesdropper direction nevertheless. As a next step, A may not transmit signals in this direction, but rather initiate countermeasures to disturb potential eavesdropping (even though E is not in the area into which A is transmitting, it may still capture some energy from the electromagnetic wave; PAAs can focus the transmit energy into one direction, but leakage is always possible, e.g., via side lobes of the beams).
One countermeasure for A is to transmit jamming signals or artificial noise towards the direction of the potential eavesdropper. This can be pseudo-noise (e.g. following a Gaussian distribution for maximum entropy, i.e., maximum uncertainty) or another kind of jamming signal. This can be done simultaneously, while transmitting the intended signals towards B, when multiple PAAs are deployed at the transmitter A (Hybrid MIMO architecture). If B and E are located on the same line originating from A (i.e., B and E are located on the same direction), then secure communication may not be guaranteed. If, however, the distances are known in addition (e.g. observing the time of flight from reflection (from B and E) to A), then parabolic phase shifter settings may be used at the PAAs of A, to focus transmit power of the intended signal in the position of B and to send jamming signals focused at the position of E. Another countermeasure would be to initiate spatial hopping, i.e., splitting the intended signal into small chunks, each chunk being transmitted over a different direction (ideally excluding direction toward E), using a different beam. Only those beams will be used, which end at position of B, possibly via reflections (nonline of sight (NLOS) links). These beams are not necessarily the optimum beams for data transfer from A to B, but may be sufficiently good to allow secure communication. It is highly unlikely that eavesdropper E can intercept small energy portions from all such beams, since E is located in a different position than B (even though E may be located in the same direction).
This allows the first communication device (A in
In an embodiment, A is equipped with two different phased array antennas A1 and A2, as shown in
Preferably, as shown in
For example, as illustrated in
As a part of a communication device 30, the data processing unit 31 performs a process on data for transmission and reception. Specifically, the data processing unit 31 generates a frame on the basis of data from a higher layer of the communication device 30, and provides the generated frame to the wireless communication unit 32. For example, the data processing unit 31 generates a frame (in particular a MAC frame) from the data by performing processes such as fragmentation, segmentation, aggregation, addition of a MAC header for media access control (MAC), addition of an error detection code, or the like. In addition, the data processing unit 31 extracts data from the received frame, and provides the extracted data to the higher layer of the communication device 30. For example, the data processing unit 31 acquires data by analyzing a MAC header, detecting and correcting a code error, and performing a reorder process, or the like with regard to the received frame.
The wireless communication unit 32 has a signal processing function, a wireless interface function, and the like as part of a communication unit. Further, a beamforming function is provided. This unit generates and sends PHY layer packets (or, in particular for a WLAN standard, PHY layer protocol data units (PPDU)).
The signal processing function is a function of performing signal processing such as modulation on frames. Specifically, the wireless communication unit 32 performs encoding, interleaving, and modulation on the frame provided from the data processing unit 31 in accordance with a coding and modulation scheme set by the control unit 33, adds a preamble and a PHY header, and generates a PHY layer packet. Further, the wireless communication unit 32 recovers a frame by performing demodulation, decoding, and the like on the PHY layer packet obtained by a process of the wireless interface function, and provides the obtained frame to the data processing unit 31 or the control unit 33.
The wireless interface function is a function to transmit/receive a signal via one or more antennas. Specifically, the wireless communication unit 32 converts a signal related to the symbol stream obtained through the process performed by the signal processing function into an analog signal, amplifies the signal, filters the signal, and up-converts the frequency. Next, the wireless communication unit 32 transmits the processed signal via the antenna. In addition, on the signal obtained via the antenna, the wireless communication unit 32 performs a process that is opposite to the process at the time of signal transmission such as down-conversion in frequency or digital signal conversion.
The beamforming function performs analog beamforming and/or digital beamforming, including beamforming training, as generally known in the art.
As a part of the communication unit, the control unit 33 (e.g., station management entity (SME)) controls entire operation of the communication device 30. Specifically, the control unit 33 performs a process such as exchange of information between functions, setting of communication parameters, or scheduling of frames (or packets) in the data processing unit 31.
The storage unit 34 stores information to be used for processing by the data processing unit 31 or the control unit 33. Specifically, the storage unit 34 stores information stored in a transmission frame, information acquired from a receiving frame, information on a communication parameter, or the like.
In an alternative embodiment, the first and second communication devices, in particular each of the AP 10 and the STAs 20, may be configured by use of circuitry that implements the units shown in
In an embodiment knowledge about the position of the second communication device is used in step S18 by the first communication device to transmit a message into a first direction suitable for exchanging information with the second communication device. The first direction may hereby be determined from the position of the second communication device and/or the received echo signals. In an embodiment, steps S18 and S20 may be carried out at the same time.
In another embodiment, the first communication device transmits noise into a second direction suitable for reaching the potentially eavesdropping communication device (step S20). The second direction may hereby be determined from the position of the potentially eavesdropping communication device and/or the received echo signals.
The transmission of the noise may be made simultaneously to the transmission of the message.
Another embodiment may be configured to distinguish between the potentially eavesdropping communication device and uncritical communication devices (including the second communication device, but also other communication devices that are potentially no eavesdropper) based on a metric.
Another embodiment may be configured to distinguish between the potentially eavesdropping communication device and uncritical communication devices based on a metric using one or more of the properties of the reflected signal, the properties including the amount of reflected signal energy, frequency selectivity, signal amplitudes, and signal phases.
The disclosed solution is well suited to be adopted by future products according to the standard IEEE 802.11ay or amendments thereof, because i) it leverages the mmWave and in particular Hybrid MIMO concepts that is required for those products and ii) applications might be found in internet of things (IOT) use cases that require physical layer security either because constraints like computational complexity or power consumption prohibit application of conventional cryptographic methods. Further, the disclosed techniques are advantageous when the signals rather than the payload information need to be protected (which is the case for conventional cryptography).
An example is the transmission of the position of tracking devices. When a device A transmits its position information to a base station B, it can encrypt the position information, but when sending the encrypted message, A discloses its position (from the transmitted waveform itself). Hence, a potential eavesdropper that receives the encrypted signal at multiple positions can triangulate A's position.
Thus, the foregoing discussion discloses and describes merely exemplary embodiments of the present disclosure. As will be understood by those skilled in the art, the present disclosure may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Accordingly, the disclosure of the present disclosure is intended to be illustrative, but not limiting of the scope of the disclosure, as well as other claims. The disclosure, including any readily discernible variants of the teachings herein, defines, in part, the scope of the foregoing claim terminology such that no inventive subject matter is dedicated to the public.
In the claims, the word “comprising” does not exclude other elements or steps, and the indefinite article “a” or “an” does not exclude a plurality. A single element or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
In so far as embodiments of the disclosure have been described as being implemented, at least in part, by software-controlled data processing apparatus, it will be appreciated that a non-transitory machine-readable medium carrying such software, such as an optical disk, a magnetic disk, semiconductor memory or the like, is also considered to represent an embodiment of the present disclosure. Further, such a software may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems.
The elements of the disclosed devices, apparatus and systems may be implemented by corresponding hardware and/or software elements, for instance appropriated circuits or circuitry. A circuit is a structural assemblage of electronic components including conventional circuit elements, integrated circuits including application specific integrated circuits, standard integrated circuits, application specific standard products, and field programmable gate arrays. Further, a circuit includes central processing units, graphics processing units, and microprocessors which are programmed or configured according to software code. A circuit does not include pure software, although a circuit includes the above-described hardware executing software. A circuit or circuitry may be implemented by a single device or unit or multiple devices or units, or chipset(s), or processor(s).
It follows a list of further embodiments of the disclosed subject matter:
1. A first communication device for use in a wireless communication system to communicate with a second communication device, the first communication device comprising circuitry configured to
Number | Date | Country | Kind |
---|---|---|---|
19209181.7 | Nov 2019 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2020/081492 | 11/9/2020 | WO |