Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band
Abstract
Nanoscale communication systems operating in Terahertz (THz) band are anticipated to revolutionise the healthcare systems of the future. Global wireless data traffic is undergoing a rapid growth. However, wireless systems, due to their broadcasting nature, are vulnerable to malicious security breaches. In addition, advances in quantum computing poses a risk to existing crypto-based information security. It is of the utmost importance to make the THz systems resilient to potential active and passive attacks which may lead to devastating consequences, especially when handling sensitive patient data in healthcare systems. New strategies are needed to analyse these malicious attacks and to propose viable countermeasures. In this manuscript, we present a new authentication mechanism for nanoscale communication systems operating in THz band at the physical layer. We assessed an impersonation attack on a THz system. We propose using path loss as a fingerprint to conduct authentication via two-step hypothesis testing for a transmission device. We used hidden Markov Model (HMM) viterbi algorithm to enhance the output of hypothesis testing. We also conducted transmitter identification using maximum likelihood and Gaussian mixture model (GMM) expectation maximization algorithms. Our simulations showed that the error probabilities are a decreasing functions of SNR. At dB with false alarm, the detection probability was almost one. We further observed that HMM out-performs hypothesis testing at low SNR regime ( increase in accuracy is recorded at SNR = dB) whereas the GMM is useful when ground truths are noisy. Our work addresses major security gaps faced by communication system either through malicious breaches or quantum computing, enabling new applications of nanoscale systems for Industry 4.0.
I Introduction
The recent developments in the nano fabrication technologies has led to an increased interest in the design of nanoscale communication systems where small devices (of size few nm) that are few millimeter apart from each other communicate to each other [1]. Due to their small size, the existing frameworks, techniques and methods proposed for communication networks such as Wifi, 4G etc. are not suitable for exchanging information amongst the nano devices [2]. For instance, nano devices are unable to operate at microwave bands due to their small size. They will require molecular communication and Terahertz (THz) band for operation [2]. Additionally, in IoT devices, due to small energy sources, the computational processing capability is limited. Therefore, it is necessary to meet the requirements for new protocols of nano devices at all layers of protocol stack. Operating in the THz band (0.1 - 10 THz) is a promising solution at the physical layer (PL) [3] which makes the antenna size very small and thus suitable for exchanging information between nano devices. Potential applications of nanoscale communication in THz band include environmental monitoring, precision agriculture, smart health care and to name a few[4].

Like other communication networks the nanoscale communication networks are also prone to a wide range of active and passive attacks by adversaries[5]. Some of the common attacks include eavesdropping, impersonation, Denial of Services (DoS) etc. Here we investigate an impersonation attack in nanoscale communication networks. Figure 1 shows an illustration of a scenario of impersonation attack on a smart healthcare system. The nano nodes are deployed inside or on the body of a person for diseases diagnostics or to remotely monitor their health parameters. These nano devices are connected to a nano router which communicates the data to an outdoor network via a nano to micro interface. Assuming, an enemy of the person, secretly deployed its own nano nodes nearby with the aim of impersonating person’s legal nodes to report false measurements to the remote monitoring system, an incorrect response through nano machines or nearby doctors could result in devastating consequences. Therefore, we need an authentication mechanism at the nano router to allow data transmission i.e. health measurements from legal nodes only, blocking all malicious nodes.
In traditional communication systems, the countermeasures for such attacks were made at the higher layer using cryptography. Despite the wide work in the field of cryptography, the mechanism can be compromised because of its solely dependency on the predefined shared secret among the legal users. With recent advances in quantum computing, the traditional encryption become vulnerable to be easily decoded and existing crypto-based measures are not quantum secure unless the size of secret key increases to impractical length [6]. In this regard, physical layer (PL) security finds itself a promising mechanism in future communication systems. PL security exploits the random nature of physical medium/layer for security purposes [7].
Authentication is one of the pillars required for the security of any communication system. PL authentication is a systematic procedure that uses PL’s features to provide authentication. In conventional systems, asymmetric key encryption (AKE) is typically used in the authentication phase which is the realm of public key encryption (a crypto based approach). Such schemes are quantum insecure and incur overhead or high computations which not only increase the size of the device but also consume high power. The devices fabricated for nanoscale communication are energy constrained as they comprise a small source of energy (battery). PL authentication has a low overhead (simple procedure which typically includes feature estimation and testing) and is almost impossible to clone unless the devices lie on each other. Various fingerprints including RSS [8], CIR [9] [10], CFR [11] [12], carrier frequency offset [13] [14], I/Q imbalance [15] are reported for PL authentication in conventional communication systems.
Regarding security of systems operating in THz band, we found two works[5][16] in the literature. The experimental work of Jianjun et al. [5] for the first time rejected the claim about security in THz band. The claim was that the inherit narrow beamwidth of THz link makes it secure and thus impossible for a malicious node to accomplish an eavesdropping attack. A similar claim is also made for beyond the THz band [17]. The authors in [5] their experiments used reflectors of different shapes between THz transmitter and receiver. Then with the help of secrecy capacity and blockage as performance metrics, they clearly demonstrated that eavesdropping attack in THz can easily be done.The work considered an eavesdropping attack in a system operating in THz band which is different than the attack we consider in this work.
In our previous work [16], we studied PL authentication for an in-vivo nanoscale communication system whereby we utilized the path loss as the device fingerprint for three nodes system (i.e. Alice, Eve and Bob). Our previous work [16] was limited to three nodes system only. In this manuscript, we extend our previous work by studying the authentication of a generic system, comprising multiple legal and malicious nodes, operating in the THz band. We exploit the high-resolution transmission molecular absorption (HITRAN)[18] data base for computing the path loss. We perform authentication by hypothesis testing. We refine the output of hypothesis testing via the hidden Markov model (HMM) viterbi algorithm. We also perform transmitter identification via the maximum likelihood and Gaussian mixture model (GMM) expectation maximization algorithm.
Outline. The rest of this paper is organized as follows. Section II provides system model. Section III discusses authentication via two-step hypothesis testing. Section IV presents hidden markov model to refine the output of hypothesis testing. Section V provides transmitter identification schemes. Section VI presents simulation results with discussions and Section VII concludes the paper.
II System Model
For the purpose of simulation, we considered a square 2D map/layout of size ( m m) where nano transmission (Tx) nodes, Alice (Legal) nodes and Eve (Malicous) nodes , deployed according to the uniform distribution model, whilst a nano router/receiver node, Bob, is placed at origin as shown in Fig. 2. We assume that the Tx nodes transmits with a fixed/pre-specified transmit power so that the path loss can be computed by Bob.

(1) |
where is the frequency, is the distance, is the absorption loss, and is the spreading loss. The spreading loss is given as
(2) |
where is the speed of light. The absorption loss is given as:
(3) |
where represents the transmittance of the signal and is given by Beer-Lambart law:
(4) |
where is the medium absorption coefficient, given as:
(5) |
where
(6) |
where is the isotopologue (molecule that differs in isotropic composition) and is gas, are standard pressure (Temperature), is the absorption cross-section and is the molecular density given by
(7) |
where is gas constant, is the Avogadro constant and is the mixing ration for of . The absorption cross-section can be expressed as
(8) |
where, the line intensity and line shape parameters can be computed using data from HITRAN database [18]
III Authentication via Two-Step Hypothesis Testing
We assume that the shared channel is time-slotted, whilst the transmit nodes perform channel sensing before transmitting, hence there are no collisions. Without the loss of generality, it can be assumed that is the legitimate user for the slot , but if doesn’t transmit during this time-slot, could transmit to Bob pretending to be an Alice node. Therefore, Bob needs to authenticate each message received on the shared channel and verify the transmitter identity (if no impersonation has been declared) in a systematic manner.
Assuming that the noisy measurement has been obtained at time (for instance, by using the pulse based method as discussed in [21]), where and is the path loss. Furthermore, in line with previous studies[16],[22], we assume that Bob has already learnt the ground truth via prior training on a secure channel. The ground truth vector can be denoted by . The maximum likelihood (ML) hypothesis test can be explained by the following equation:
(9) |
Next, the binary hypothesis test works as follows:
(10) |
Equivalently, we have:
(11) |
where is a small threshold - a design parameter. This work follows the Neyman-Pearson theorem [23] which states that, for a pre-specified , can be chosen such that is minimized.
The error probabilities for the above hypothesis tests are:
(12) |
where is the complementary cumulative distribution function (CCDF) of a standard normal distribution, and is the prior probability of . Thus, the threshold could be computed as follows:
(13) |
Then, is given as:
(14) |
where is the prior probability of . is the fraction of slots which are originally dedicated to but are found idle and thus utilized by .
Since is an R.V., the expected value is as follows:
(15) |
where we have assumed that the unknown path loss , and .
IV Hidden Markov Model based Approach
At a given time instant , the system is in one of the two states with the state-space: . The states and imply that there is no impersonation, impersonation respectively at time . However, the true state of the system is hidden; therefore, what we observe through the hypothesis test is another observable Markov chain. The connection between the true/hidden state and the observable state is given by the emission probability matrix:
(16) |
where , . The off-diagonal elements in the -th row of represents the errors made by the ML test, i.e., deciding the state as , while the system was actually in state .
The transition from state to state occurs after a fixed interval of seconds where is the measurement rate. Assuming that the system was in state at time , i.e. and we are in time and we want to predict the probability vector at time and the system is in state , . To this end, we have the following transition probability matrix:
(17) |
where , . Then, we have the following relation: . Alternatively, we can write: .
IV-A ML Estimation of a Hidden Markov Sequence using Viterbi Algorithm
Viterbi algorithm is used for ML sequence estimation (MLSE) of , given as:
(18) |
V Transmitter Identification
The probability of misclassification error resulting from Eq. 9 is given as:
(19) |
where . For the hypothesis test of (11), is given as:
(20) |
where , . Additionally, where sort operation (.) sorts a vector in an increasing order. For the boundary cases, e.g., , , respectively.
V-A Transmitter Identification using Gaussian Mixture Modelling
The GMM was consisted of component densities where only the densities could be trained. The GMM parameters was learnt by running the Expectation-Maximization (EM) algorithm on the training data. GMM, in its standard form, is perfectly suited for transmitter identification. Under GMM, the probability density function (pdf) of the (observed) mixture random variable is the convex/weighted sum of the component pdfs:
(21) |
where each is a Gaussian pdf which satisfies: , . The weights/priors satisfy: , .
The GMM has unknown parameters which were learnt by applying the iterative Expectation-Maximization algorithm on training data . The posterior probability for each point in the training data (i.e., the likelihood of belonging to component of the mixture) was computed as follows ( is the iteration number):
(22) |
The number of priors were updated as follows:
(23) |
The number of means were updated as follows:
(24) |
The number of (co-)variances were updated as follows:
(25) |
The iterative EM algorithm monotonically increased the objective (likelihood) function value, and converged when the increase in likelihood function value between two successive iterations became less than the threshold .
VI Simulation Results
We kept , , THz, k and atm. Both Alice and Eve nodes were deployed according to uniform distribution in area. Total random realisations (independent for Alice and Eve nodes) of nodes’ deployment were taken and then errors were averaged over the realizations.


and are two well-known probabilities resulting in hypothesis testing. The was defined as the probability that any th Alice node can be considered as any of the Eve nodes. While the is the probability of the event that any th Eve node can be considered as any of the Alice nodes.
Fig. 3 represents the two probabilities against the SNR where the improvement in error probabilities with an increasing SNR can be seen clearly. The designed parameter decreases but increases .






Fig. 4 shows the efficacy of HMM. At low SNR the performance of HMM was far better than HT and at high SNR HT was closed to HMM. The results were produced after monte carlo based simulation. The total number of transmissions were kept to (more specifically, binary states (, ) were generated), , , where is the identity matrix and . The error resulting from HT and HMM methods were calculated as the number of times the predicted/estimated state was not equal to actual state divided by total transmissions. The accuracy was then computed accordingly. The entries of were calculated according to and . Fig. 5 shows the Receiver Operating characteristic (ROC) curves for different configurations of node and transmissions from Eve nodes (i.e. ). Typically, the ROC contains two error probabilities ( and ), but due to multiple nodes in this study, we had three probabilities. For any value the was constant which was obvious from Eq.20. Increasing SNR not only improved but also improved as well. The was chosen as an independent variable and swept on the range to . Using Eq. 13, the threshold was calculated for a given SNR value. Further, (the detection probability) and were computed as average after doing uniform realisations of nodes deployment. We observed that increasing the number of nodes does not affect the but increases with an increase in number of Alice nodes (). We further observed that the less the nodes (Alice nodes) remain idle during their allocated slot the more the we had.


is the probability of deciding th Alice node, as any Alice node without . becomes an important metric when dealing with multiple nodes’ identification. Here, resulted from both transmitter identification’s algorithms (ML which is a bi-product of two-step HT based authentication and GMM). As GMM is a learning approach, it requires training data to learn its parameters. That is the reason that we only performed transmitter identification using GMM. We assumed no data was available for Eve nodes.
Fig. 6 (a) was generated by assuming actual ground truths (noiseless ) of Alice nodes available for performing ML based transmitter identification. The ML was implemented using Eq.9 with having noiseless ground truths. Fig. 6 (a) shows that the two approaches perform equally. To test the efficacy of the GMM approach, we performed another experiment and plotted the results in Fig. 6 (b). This time we assumed that the ground truths of Alice nodes were noisy (i.e when the ground truths were obtained on secure channel it also included noise or an error). This time the the ML based approach was implemented using Eq.9 to include noisy ground truths. The GMM parameters were estimated on training data generated from the legal nodes and then tested on . The error was calculated as number of times the estimated state was not equal to the actual value divided by the total transmissions for both approaches and for both cases. We observed from Fig. 6 (b) that the overall performance of GMM was improved. The performance improved even further for lower SNR or higher .
VII Conclusion
This paper provided an authentication mechanism using path loss as a fingerprint at the physical layer in nanoscale communication systems operating in terahertz band. The work’s importance was advocated by illustrating envisioned smart healthcare application of nanoscale communication systems. The complex and quantum insecure crypto measures can be complemented using this approach which is simple and quantum secure (i.e. no encryption or shared secret key is involved). This was observed from ROC curves after doing monte carlo based simulation for nodes deployment under uniform distribution that with false rate the detection probability is almost one when operating with SNR dB. A generic system was considered comprising multiple legal and malicious nano nodes operating in Terahetrz band. Specifically, for simulation purpose, nodes were deployed in area under uniform distribution and air was considered as a medium among the nodes and path loss was calculated using HITRAN data base.
Acknowledgements
This work was made possible by NPRP grant number NPRP 10-1231-160071 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors. Waqas Aman would also like to thank Higher Education Commission of Pakistan for providing him IRSIP scholarship to travel to University of Glasgow for his studies.
References
- [1] M. S. Islam and L. Vj, “Nanoscale materials and devices for future communication networks,” IEEE Communications Magazine, vol. 48, no. 6, pp. 112–120, 2010.
- [2] I. F. Akyildiz, F. Brunetti, and C. Blázquez, “Nanonetworks: A new communication paradigm,” Computer Networks, vol. 52, no. 12, pp. 2260 – 2279, 2008. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128608001151
- [3] F. Lemic, S. Abadal, W. Tavernier, P. Stroobant, D. Colle, E. Alarcón, J. Marquez-Barja, and J. Famaey, “Survey on terahertz nanocommunication and networking: A top-down perspective,” 2019.
- [4] K. Yang, D. Bi, Y. Deng, R. Zhang, M. M. U. Rahman, N. A. Ali, M. A. Imran, J. M. Jornet, Q. H. Abbasi, and A. Alomainy, “A comprehensive survey on hybrid communication for internet of nano-things in context of body-centric communications,” 2019.
- [5] J. Ma, R. Shrestha, J. Adelberg, and et al., “Security and eavesdropping in terahertz wireless links,” in Nature, vol. 563, 2018, p. 89–93.
- [6] C. Gidney and M. Ekerå, “How to factor 2048 bit rsa integers in 8 hours using 20 million noisy qubits,” 2019.
- [7] M. Shakiba-Herfeh, A. Chorti, and H. V. Poor, “Physical layer security: Authentication, integrity and confidentiality,” 2020.
- [8] J. Yang, Y. Chen, W. Trappe, and J. Cheng, “Detection and localization of multiple spoofing attackers in wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 44–58, 2013.
- [9] S. Zafar, W. Aman, M. M. U. Rahman, A. Alomainy, and Q. H. Abbasi, “Channel impulse response-based physical layer authentication in a diffusion-based molecular communication system,” in 2019 UK/ China Emerging Technologies (UCET), 2019, pp. 1–2.
- [10] A. Mahmood, W. Aman, M. O. Iqbal, M. M. U. Rahman, and Q. H. Abbasi, “Channel impulse response-based distributed physical layer authentication,” in 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, pp. 1–5.
- [11] L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, “Using the physical layer for wireless authentication in time-variant channels,” IEEE Transactions on Wireless Communications, vol. 7, no. 7, pp. 2571–2579, 2008.
- [12] P. Baracca, N. Laurenti, and S. Tomasin, “Physical layer authentication over mimo fading wiretap channels,” IEEE Transactions on Wireless Communications, vol. 11, no. 7, pp. 2564–2573, 2012.
- [13] W. Hou, X. Wang, and J. Chouinard, “Physical layer authentication in ofdm systems based on hypothesis testing of cfo estimates,” in 2012 IEEE International Conference on Communications (ICC), 2012, pp. 3559–3563.
- [14] ——, “Physical layer authentication in ofdm systems based on hypothesis testing of cfo estimates,” in 2012 IEEE International Conference on Communications (ICC), 2012, pp. 3559–3563.
- [15] P. Hao, X. Wang, and A. Behnad, “Performance enhancement of i/q imbalance based wireless device authentication through collaboration of multiple receivers,” in 2014 IEEE International Conference on Communications (ICC), 2014, pp. 939–944.
- [16] M. M. U. Rahman, Q. H. Abbasi, N. Chopra, K. Qaraqe, and A. Alomainy, “Physical layer authentication in nano networks at terahertz frequencies for biomedical applications,” IEEE Access, vol. 5, pp. 7808–7815, 2017.
- [17] X. Liang, F. Hu, Y. Yan, and et al., “Secure thermal infrared communications using engineered blackbody radiation,” in Sci. Rep., vol. 4, 2015, p. 5245.
- [18] I. Gordon, L. Rothman, and et al., “The hitran2016 molecular spectroscopic database,” Journal of Quantitative Spectroscopy and Radiative Transfer, vol. 203, pp. 3 – 69, 2017, hITRAN2016 Special Issue.
- [19] J. M. Jornet and I. F. Akyildiz, “Channel capacity of electromagnetic nanonetworks in the terahertz band,” in 2010 IEEE International Conference on Communications, May 2010, pp. 1–6.
- [20] ——, “Channel modeling and capacity analysis for electromagnetic wireless nanonetworks in the terahertz band,” IEEE Transactions on Wireless Communications, vol. 10, no. 10, pp. 3211–3221, October 2011.
- [21] R. G. Cid-Fuentes, J. M. Jornet, I. F. Akyildiz, and E. Alarcon, “A receiver architecture for pulse-based electromagnetic nanonetworks in the terahertz band,” in 2012 IEEE International Conference on Communications (ICC), June 2012, pp. 4937–4942.
- [22] M. M. U. Rahman, A. Yasmeen, and J. Gross, “Phy layer authentication via drifting oscillators,” in 2014 IEEE Global Communications Conference, Dec 2014, pp. 716–721.
- [23] Q. Yan and R. S. Blum, “Distributed signal detection under the neyman-pearson criterion,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1368–1377, 2001.