This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band

Waqas Aman{}^{\ast}\dagger, M. Mahboob Ur Rahman, Hassan T. Abbas, Muhammad Arslan Khalid, Muhammad A. Imran,
Akram Alomainy††, and Qammer H. Abbasi
\ast Electrical Engineering Department, Information Technology University, Lahore, 54000, Pakistan
\daggerDepartment of Electronics and Nano Engineering, University of Glasgow, Glasgow, G12 8QQ, UK
\botDivision of Biomedical Engineering, School of Engineering, University of Glasgow, Glasgow, G12 8QQ, UK
\dagger\daggerSchool of Electronic Engineering and Computer science, Queen Mary University of London, London, E1 4NS, UK
{waqas.aman, mahboob.rahman}@itu.edu.pk, {Hassan.Abbas, Muhammas.Imran, Qammer. Abbasi}@glasgow.ac.uk,
[email protected], ††[email protected]
Abstract

Nanoscale communication systems operating in Terahertz (THz) band are anticipated to revolutionise the healthcare systems of the future. Global wireless data traffic is undergoing a rapid growth. However, wireless systems, due to their broadcasting nature, are vulnerable to malicious security breaches. In addition, advances in quantum computing poses a risk to existing crypto-based information security. It is of the utmost importance to make the THz systems resilient to potential active and passive attacks which may lead to devastating consequences, especially when handling sensitive patient data in healthcare systems. New strategies are needed to analyse these malicious attacks and to propose viable countermeasures. In this manuscript, we present a new authentication mechanism for nanoscale communication systems operating in THz band at the physical layer. We assessed an impersonation attack on a THz system. We propose using path loss as a fingerprint to conduct authentication via two-step hypothesis testing for a transmission device. We used hidden Markov Model (HMM) viterbi algorithm to enhance the output of hypothesis testing. We also conducted transmitter identification using maximum likelihood and Gaussian mixture model (GMM) expectation maximization algorithms. Our simulations showed that the error probabilities are a decreasing functions of SNR. At 1010 dB with 0.20.2 false alarm, the detection probability was almost one. We further observed that HMM out-performs hypothesis testing at low SNR regime (10%10\% increase in accuracy is recorded at SNR = 5−5 dB) whereas the GMM is useful when ground truths are noisy. Our work addresses major security gaps faced by communication system either through malicious breaches or quantum computing, enabling new applications of nanoscale systems for Industry 4.0.

I Introduction

The recent developments in the nano fabrication technologies has led to an increased interest in the design of nanoscale communication systems where small devices (of size few nm) that are few millimeter apart from each other communicate to each other [1]. Due to their small size, the existing frameworks, techniques and methods proposed for communication networks such as Wifi, 4G etc. are not suitable for exchanging information amongst the nano devices [2]. For instance, nano devices are unable to operate at microwave bands due to their small size. They will require molecular communication and Terahertz (THz) band for operation [2]. Additionally, in IoT devices, due to small energy sources, the computational processing capability is limited. Therefore, it is necessary to meet the requirements for new protocols of nano devices at all layers of protocol stack. Operating in the THz band (0.1 - 10 THz) is a promising solution at the physical layer (PL) [3] which makes the antenna size very small and thus suitable for exchanging information between nano devices. Potential applications of nanoscale communication in THz band include environmental monitoring, precision agriculture, smart health care and to name a few[4].

Refer to caption
Figure 1: An envisioned future nano-scale healthcare system with possible malicious nodes.

Like other communication networks the nanoscale communication networks are also prone to a wide range of active and passive attacks by adversaries[5]. Some of the common attacks include eavesdropping, impersonation, Denial of Services (DoS) etc. Here we investigate an impersonation attack in nanoscale communication networks. Figure 1 shows an illustration of a scenario of impersonation attack on a smart healthcare system. The nano nodes are deployed inside or on the body of a person for diseases diagnostics or to remotely monitor their health parameters. These nano devices are connected to a nano router which communicates the data to an outdoor network via a nano to micro interface. Assuming, an enemy of the person, secretly deployed its own nano nodes nearby with the aim of impersonating person’s legal nodes to report false measurements to the remote monitoring system, an incorrect response through nano machines or nearby doctors could result in devastating consequences. Therefore, we need an authentication mechanism at the nano router to allow data transmission i.e. health measurements from legal nodes only, blocking all malicious nodes.

In traditional communication systems, the countermeasures for such attacks were made at the higher layer using cryptography. Despite the wide work in the field of cryptography, the mechanism can be compromised because of its solely dependency on the predefined shared secret among the legal users. With recent advances in quantum computing, the traditional encryption become vulnerable to be easily decoded and existing crypto-based measures are not quantum secure unless the size of secret key increases to impractical length [6]. In this regard, physical layer (PL) security finds itself a promising mechanism in future communication systems. PL security exploits the random nature of physical medium/layer for security purposes [7].
Authentication is one of the pillars required for the security of any communication system. PL authentication is a systematic procedure that uses PL’s features to provide authentication. In conventional systems, asymmetric key encryption (AKE) is typically used in the authentication phase which is the realm of public key encryption (a crypto based approach). Such schemes are quantum insecure and incur overhead or high computations which not only increase the size of the device but also consume high power. The devices fabricated for nanoscale communication are energy constrained as they comprise a small source of energy (battery). PL authentication has a low overhead (simple procedure which typically includes feature estimation and testing) and is almost impossible to clone unless the devices lie on each other. Various fingerprints including RSS [8], CIR [9] [10], CFR [11] [12], carrier frequency offset [13] [14], I/Q imbalance [15] are reported for PL authentication in conventional communication systems.
Regarding security of systems operating in THz band, we found two works[5][16] in the literature. The experimental work of Jianjun et al. [5] for the first time rejected the claim about security in THz band. The claim was that the inherit narrow beamwidth of THz link makes it secure and thus impossible for a malicious node to accomplish an eavesdropping attack. A similar claim is also made for beyond the THz band [17]. The authors in [5] their experiments used reflectors of different shapes between THz transmitter and receiver. Then with the help of secrecy capacity and blockage as performance metrics, they clearly demonstrated that eavesdropping attack in THz can easily be done.The work considered an eavesdropping attack in a system operating in THz band which is different than the attack we consider in this work. In our previous work [16], we studied PL authentication for an in-vivo nanoscale communication system whereby we utilized the path loss as the device fingerprint for three nodes system (i.e. Alice, Eve and Bob). Our previous work [16] was limited to three nodes system only. In this manuscript, we extend our previous work by studying the authentication of a generic system, comprising multiple legal and malicious nodes, operating in the THz band. We exploit the high-resolution transmission molecular absorption (HITRAN)[18] data base for computing the path loss. We perform authentication by hypothesis testing. We refine the output of hypothesis testing via the hidden Markov model (HMM) viterbi algorithm. We also perform transmitter identification via the maximum likelihood and Gaussian mixture model (GMM) expectation maximization algorithm.

Outline. The rest of this paper is organized as follows. Section II provides system model. Section III discusses authentication via two-step hypothesis testing. Section IV presents hidden markov model to refine the output of hypothesis testing. Section V provides transmitter identification schemes. Section VI presents simulation results with discussions and Section VII concludes the paper.

II System Model

For the purpose of simulation, we considered a square 2D map/layout of size (11 m ×1\times 1 m) where M+NM+N nano transmission (Tx) nodes, MM Alice (Legal) nodes {Ai}i=1M\{A_{i}\}_{i=1}^{M} and NN Eve (Malicous) nodes {Ej}j=1N\{E_{j}\}_{j=1}^{N}, deployed according to the uniform distribution model, whilst a nano router/receiver node, Bob, is placed at origin as shown in Fig. 2. We assume that the Tx nodes transmits with a fixed/pre-specified transmit power so that the path loss can be computed by Bob.

Refer to caption
Figure 2: The system model: Bob is placed at origin. Alice and Eve nodes’ locations are modelled as uniformly distributed random variables. In this case, M=10M=10, N=10N=10.

The path loss is given as [19],[20]:

L(f,d)[dB]=La(f,d)[dB]+Ls(f,d)[dB]\displaystyle L(f,d)[dB]=L_{a}(f,d)[dB]+L_{s}(f,d)[dB] (1)

where ff is the frequency, dd is the distance, La(f,d)[dB]L_{a}(f,d)[dB] is the absorption loss, and Ls(f,d)[dB]L_{s}(f,d)[dB] is the spreading loss. The spreading loss is given as

Ls(f,d)[dB]=20log10(4πfdc),L_{s}(f,d)[dB]=20\log_{10}(\frac{4\pi fd}{c}), (2)

where cc is the speed of light. The absorption loss is given as:

La(f,d)=1τ(f,d)L_{a}(f,d)=\frac{1}{\tau(f,d)} (3)

where τ\tau represents the transmittance of the signal and is given by Beer-Lambart law:

τ(f,d)=ek(f)d\displaystyle\tau(f,d)=e^{-k(f)d} (4)

where kk is the medium absorption coefficient, given as:

k(f)=i,gki,g(f)k(f)=\sum_{i,g}k_{i,g}(f) (5)

where

ki,g(f)=pp0T0TQi,gσi,g(f)k_{i,g}(f)=\frac{p}{p_{0}}\frac{T_{0}}{T}Q_{i,g}\sigma_{i,g}(f) (6)

where ii is the isotopologue (molecule that differs in isotropic composition) and gg is gas, p0(T0)p_{0}(T_{0}) are standard pressure (Temperature), σi,g(f)\sigma_{i,g}(f) is the absorption cross-section and Qi,gQ_{i,g} is the molecular density given by

Qi,g=nVqi,gNA=pRTqi,gNAQ_{i,g}=\frac{n}{V}q_{i,g}N_{A}=\frac{p}{RT}q_{i,g}N_{A} (7)

where RR is gas constant, NAN_{A} is the Avogadro constant and qi,gq_{i,g} is the mixing ration for ii of gg. The absorption cross-section can be expressed as

σi,g=Si,gGi,g(f)\sigma_{i,g}=S_{i,g}G_{i,g}(f) (8)

where, the line intensity Si,gS_{i,g} and line shape Gi,g(f)G_{i,g}(f) parameters can be computed using data from HITRAN database [18]

III Authentication via Two-Step Hypothesis Testing

We assume that the shared channel is time-slotted, whilst the transmit nodes perform channel sensing before transmitting, hence there are no collisions. Without the loss of generality, it can be assumed that AiA_{i} is the legitimate user for the slot kk, but if AiA_{i} doesn’t transmit during this time-slot, EjE_{j} could transmit to Bob pretending to be an Alice node. Therefore, Bob needs to authenticate each message received on the shared channel and verify the transmitter identity (if no impersonation has been declared) in a systematic manner.

Assuming that the noisy measurement z(k)=L+n(k)z(k)=L+n(k) has been obtained at time kk (for instance, by using the pulse based method as discussed in [21]), where n(k)N(0,σ2)n(k)\sim N(0,\sigma^{2}) and LL is the path loss. Furthermore, in line with previous studies[16],[22], we assume that Bob has already learnt the ground truth via prior training on a secure channel. The ground truth vector can be denoted by 𝐥={L1,,LM}T\mathbf{l}=\{L_{1},...,L_{M}\}^{T}. The maximum likelihood (ML) hypothesis test can be explained by the following equation:

(T,i)=min𝑖|zLi|(T^{*},i^{*})=\underset{i}{\min}\quad|z-L_{i}| (9)

Next, the binary hypothesis test works as follows:

{H0(no impersonation):T=min𝑖|z(k)Li|<ϵH1(impersonation):T=min𝑖|z(k)Li|>ϵ\begin{cases}H_{0}(\text{no impersonation}):&T^{*}=\underset{i}{\min}|z(k)-L_{i}|<\epsilon\\ H_{1}(\text{impersonation}):&T^{*}=\underset{i}{\min}|z(k)-L_{i}|>\epsilon\end{cases} (10)

Equivalently, we have:

TH0H1ϵ\displaystyle T^{*}\gtrless_{H_{0}}^{H_{1}}{\epsilon} (11)

where ϵ\epsilon is a small threshold - a design parameter. This work follows the Neyman-Pearson theorem [23] which states that, for a pre-specified PfaP_{fa}, ϵ\epsilon can be chosen such that PmdP_{md} is minimized.

The error probabilities for the above hypothesis tests are:

Pfa=P(H1|H0)=i=1MP(T>ϵ|Ai)π(i)=i=1M2Q(ϵσ)π(i)=2Q(ϵσ)i=1Mπ(i)=2Q(ϵσ)\begin{split}P_{fa}&=P(H_{1}|H_{0})=\sum_{i=1}^{M}P(T^{*}>\epsilon|A_{i})\pi(i)\\ &=\sum_{i=1}^{M}2Q(\frac{\epsilon}{\sigma})\pi(i)=2Q(\frac{\epsilon}{\sigma})\sum_{i=1}^{M}\pi(i)=2Q(\frac{\epsilon}{\sigma})\end{split} (12)

where Q(x)=12πxet22𝑑tQ(x)=\frac{1}{\sqrt{2}\pi}\int_{x}^{\infty}e^{\frac{-t^{2}}{2}}dt is the complementary cumulative distribution function (CCDF) of a standard normal distribution, and π(i)\pi(i) is the prior probability of AiA_{i}. Thus, the threshold could be computed as follows:

ϵ=σQ1(Pfa2)\epsilon=\sigma Q^{-1}(\frac{P_{fa}}{2}) (13)

Then, PmdP_{md} is given as:

Pmd=P(H0|H1)=P(T<ϵ|H1)=j=1Ni=1M[Q(LiLjϵσ)Q(LiLj+ϵσ)]π(j)\begin{split}&{P}_{md}=P(H_{0}|H_{1})=P(T^{*}<\epsilon|H_{1})\\ &=\sum_{j=1}^{N}\sum_{i=1}^{M}\bigg{[}Q(\frac{L_{i}-L_{j}-\epsilon}{\sigma})-Q(\frac{L_{i}-L_{j}+\epsilon}{\sigma})\bigg{]}\pi(j)\end{split} (14)

where π(j)=i=1Mαijπ(i)\pi(j)=\sum_{i=1}^{M}\alpha_{ij}\pi(i) is the prior probability of EjE_{j}. 0<αij<10<\alpha_{ij}<1 is the fraction of slots which are originally dedicated to AiA_{i} but are found idle and thus utilized by EjE_{j}.

Since PmdP_{md} is an R.V., the expected value P¯md:=𝔼(Pmd)\bar{P}_{md}:=\mathbb{E}(P_{md}) is as follows:

P¯md=j=1N1Δπ(j).(LminLmaxi=1MQ(LiLj(E)ϵσ)Q(LiLj(E)+ϵσ)dLj(E))=j=1N1Δπ(j).(LminLmaxi=1MQ(LiL(E)ϵσ)Q(LiL(E)+ϵσ)dL(E))\begin{split}&\bar{P}_{md}=\sum_{j=1}^{N}\frac{1}{\Delta}\pi(j).\\ &\bigg{(}\int_{L_{min}}^{L_{max}}\sum_{i=1}^{M}Q(\frac{L_{i}-L_{j}^{(E)}-\epsilon}{\sigma})-Q(\frac{L_{i}-L_{j}^{(E)}+\epsilon}{\sigma})dL_{j}^{(E)}\bigg{)}\\ &=\sum_{j=1}^{N}\frac{1}{\Delta}\pi(j).\\ &\bigg{(}\int_{L_{min}}^{L_{max}}\sum_{i=1}^{M}Q(\frac{L_{i}-L^{(E)}-\epsilon}{\sigma})-Q(\frac{L_{i}-L^{(E)}+\epsilon}{\sigma})dL^{(E)}\bigg{)}\end{split} (15)

where we have assumed that the unknown path loss LjU(Lmin,Lmax)L_{j}\sim U(L_{min},L_{max}) j\forall j, and Δ=LmaxLmin\Delta=L_{max}-L_{min}.

IV Hidden Markov Model based Approach

At a given time instant kk, the system is in one of the two states with the state-space: 𝒮={s0,s1}\mathcal{S}=\{s_{0},s_{1}\}. The states s0s_{0} and s1s_{1} imply that there is no impersonation, impersonation respectively at time kk. However, the true state of the system is hidden; therefore, what we observe through the hypothesis test is another observable Markov chain. The connection between the true/hidden state and the observable state is given by the emission probability matrix:

𝐑=[r0,0r0,1r1,0r1,1]\mathbf{R}=\begin{bmatrix}r_{0,0}&r_{0,1}\\ r_{1,0}&r_{1,1}\end{bmatrix} (16)

where ri,j=Pr(x[k]=i|s[k]=j)r_{i,j}=Pr(x[k]=i|s[k]=j), i,j{0,1}i,j\in\{0,1\}. The off-diagonal elements in the ii-th row of 𝐑\mathbf{R} represents the errors made by the ML test, i.e., deciding the state as s[k]=js[k]=j, j{0,1}ij\in\{0,1\}\setminus{i} while the system was actually in state s[k]=is[k]=i.

The transition from state ii to state jj occurs after a fixed interval of T=tktk1T=t_{k}-t_{k-1} seconds where 1/T1/T is the measurement rate. Assuming that the system was in state s0s_{0} at time k=0k=0, i.e. 𝐱[0]=[1,0]T\mathbf{x}[0]=[1,0]^{T} and we are in time k1k-1 and we want to predict the probability vector 𝐱[k]\mathbf{x}[k] at time kk and the system is in state sis_{i}, i{0,1}i\in\{0,1\}. To this end, we have the following transition probability matrix:

𝐏=[p0,0p0,1p1,0p1,1]\mathbf{P}=\begin{bmatrix}p_{0,0}&p_{0,1}\\ p_{1,0}&p_{1,1}\end{bmatrix} (17)

where pi,j=P(x[k]=j|x[k1]=i)p_{i,j}=P(x[k]=j|x[k-1]=i), i,j{0,1}i,j\in\{0,1\}. Then, we have the following relation: 𝐱[k]=𝐏k𝐱[0]\mathbf{x}[k]=\mathbf{P}^{k}\mathbf{x}[0]. Alternatively, we can write: 𝐱[k]=𝐏𝐱[k1]\mathbf{x}[k]=\mathbf{P}\mathbf{x}[k-1].

IV-A ML Estimation of a Hidden Markov Sequence using Viterbi Algorithm

Viterbi algorithm is used for ML sequence estimation (MLSE) of {s[k]}k=1K\{s[k]\}_{k=1}^{K}, given {x[k]}k=1K\{x[k]\}_{k=1}^{K} as:

{s[k]}=argmax{s[k]}p(x[k]|s[k])\{s[k]\}=\arg\max_{\{s^{{}^{\prime}}[k]\}}p(x[k]|s^{{}^{\prime}}[k]) (18)

V Transmitter Identification

The probability of misclassification error resulting from Eq. 9 is given as:

Pmc=i=1MPmc|i.π(i)P_{mc}=\sum_{i=1}^{M}P_{mc|i}.\pi(i) (19)

where Pmc|i=P(Bob decides Aj|Ai was the sender)P_{mc|i}=P(\text{Bob decides }A_{j}|A_{i}\text{ was the sender}). For the hypothesis test of (11), Pmc|iP_{mc|i} is given as:

Pmc|i=1(Q(L~l,iL~iσ)Q(L~u,iL~iσ))P_{mc|i}=1-\bigg{(}Q(\frac{\tilde{L}_{l,i}-\tilde{L}_{i}}{\sigma})-Q(\frac{\tilde{L}_{u,i}-\tilde{L}_{i}}{\sigma})\bigg{)} (20)

where L~l,i=L~i1+L~i2\tilde{L}_{l,i}=\frac{\tilde{L}_{i-1}+\tilde{L}_{i}}{2}, L~u,i=L~i+L~i+12\tilde{L}_{u,i}=\frac{\tilde{L}_{i}+\tilde{L}_{i+1}}{2}. Additionally, 𝐥~={L~1,,L~M}=sort(𝐥)\mathbf{\tilde{l}}=\{\tilde{L}_{1},...,\tilde{L}_{M}\}=\text{sort}(\mathbf{l}) where sort operation (.) sorts a vector in an increasing order. For the boundary cases, e.g., i=1,i=Mi=1,i=M, L~l,1=Lmin\tilde{L}_{l,1}=L_{min}, L~l,M=Lmax\tilde{L}_{l,M}=L_{max} respectively.

V-A Transmitter Identification using Gaussian Mixture Modelling

The GMM was consisted of Q=M+NQ=M+N component densities where only the Q=MQ=M densities could be trained. The 3Q3Q GMM parameters was learnt by running the Expectation-Maximization (EM) algorithm on the training data. GMM, in its standard form, is perfectly suited for transmitter identification. Under GMM, the probability density function (pdf) of the (observed) mixture random variable XX is the convex/weighted sum of the component pdfs:

fX(x)=q=1Qπqϕq(x)f_{X}(x)=\sum_{q=1}^{Q}\pi_{q}\phi_{q}(x) (21)

where each ϕq(x)\phi_{q}(x) is a Gaussian pdf which satisfies: ϕq(x)0\phi_{q}(x)\geq 0, xϕq(x)𝑑x=1\int_{x\in\mathbb{R}}\phi_{q}(x)dx=1. The weights/priors satisfy: πq(x)0\pi_{q}(x)\geq 0, q=1Qπq=1\sum_{q=1}^{Q}\pi_{q}=1.

The GMM has 3Q3Q unknown parameters which were learnt by applying the iterative Expectation-Maximization algorithm on training data {xm}m=1M\{x_{m}\}_{m=1}^{M}. The posterior probability for each point xmx_{m} in the training data (i.e., the likelihood of xmx_{m} belonging to component qq of the mixture) was computed as follows (jj is the iteration number):

pm,q(j)=πq(j)ϕq(xm,μq(j),Σq(j))q^=1Qπq^(j)ϕ(xm,μq^(j),Σq^(j))p_{m,q}^{(j)}=\frac{\pi_{q}^{(j)}\phi_{q}(x_{m},\mu_{q}^{(j)},\Sigma_{q}^{(j)})}{\sum_{\hat{q}=1}^{Q}\pi_{\hat{q}}^{(j)}\phi(x_{m},\mu_{\hat{q}}^{(j)},\Sigma_{\hat{q}}^{(j)})} (22)

The QQ number of priors were updated as follows:

πq(j+1)=1Mm=1Mpm,q(j)\pi_{q}^{(j+1)}=\frac{1}{M}\sum_{m=1}^{M}p_{m,q}^{(j)} (23)

The QQ number of means were updated as follows:

μq(j+1)=m=1Mpm,q(j)xmm=1Mpm,q(j)\mu_{q}^{(j+1)}=\frac{\sum_{m=1}^{M}p_{m,q}^{(j)}x_{m}}{\sum_{m=1}^{M}p_{m,q}^{(j)}} (24)

The QQ number of (co-)variances were updated as follows:

Σq(j+1)=m=1Mpm,q(j)(xmμq(j))(xmμq(j))Tm=1Mpm,q(j)\Sigma_{q}^{(j+1)}=\frac{\sum_{m=1}^{M}p_{m,q}^{(j)}(x_{m}-\mu_{q}^{(j)})(x_{m}-\mu_{q}^{(j)})^{T}}{\sum_{m=1}^{M}p_{m,q}^{(j)}} (25)

The iterative EM algorithm monotonically increased the objective (likelihood) function value, and converged when the increase in likelihood function value between two successive iterations became less than the threshold ϵ\epsilon.

VI Simulation Results

We kept M=N=10M=N=10, αij=0.5j\alpha_{ij}=0.5\ \forall j, f=1f=1 THz, T=285T=285 k and p=1p=1 atm. Both Alice and Eve nodes were deployed according to uniform distribution in 1m×1m1m\times 1m area. Total 10510^{5} random realisations (independent for Alice and Eve nodes) of nodes’ deployment were taken and then errors were averaged over the realizations.

Refer to caption
(a) False alarm
Refer to caption
(b) Missed detection
Figure 3: The error probabilities against the SNR 1σ2\frac{1}{\sigma^{2}}

PfaP_{fa} and PmdP_{md} are two well-known probabilities resulting in hypothesis testing. The PfaP_{fa} was defined as the probability that any ii-th Alice node can be considered as any of the Eve nodes. While the PmdP_{md} is the probability of the event that any jj-th Eve node can be considered as any of the Alice nodes.

Fig. 3 represents the two probabilities against the SNR =1σ2=\frac{1}{\sigma^{2}} where the improvement in error probabilities with an increasing SNR can be seen clearly. The designed parameter ϵ\epsilon decreases Pmd{P}_{md} but increases PfaP_{fa}.

Refer to caption
(a) SNR =5=-5 dB
Refer to caption
(b) SNR =0=0 dB
Figure 4: Performance comparison of HT and HMM.
Refer to caption
(a) M=N=10M=N=10 αij=0.5j\alpha_{ij}=0.5\ \forall j
Refer to caption
(b) M=N=20M=N=20 αij=0.5j\alpha_{ij}=0.5\ \forall j
Refer to caption
(c) M=N=10M=N=10 αij=0.25j\alpha_{ij}=0.25\ \forall j
Refer to caption
(d) M=N=20M=N=20 αij=0.25j\alpha_{ij}=0.25\ \forall j
Figure 5: ROC curves

Fig. 4 shows the efficacy of HMM. At low SNR the performance of HMM was far better than HT and at high SNR HT was closed to HMM. The results were produced after monte carlo based simulation. The total number of transmissions were kept to 10510^{5} (more specifically, 10510^{5} binary states (s0s_{0}, s1s_{1}) were generated), ϵ=1\epsilon=1, 𝐏=0.5I2×2\mathbf{P}=0.5I_{2\times 2}, where II is the identity matrix and K=103K=10^{3}. The error resulting from HT and HMM methods were calculated as the number of times the predicted/estimated state was not equal to actual state divided by total transmissions. The accuracy was then computed accordingly. The entries of 𝐑\mathbf{R} were calculated according to PfaP_{fa} and PmdP_{md}. Fig. 5 shows the Receiver Operating characteristic (ROC) curves for different configurations of node and transmissions from Eve nodes (i.e. αij\alpha_{ij}). Typically, the ROC contains two error probabilities (PdP_{d} and PfaP_{fa}), but due to multiple nodes in this study, we had three probabilities. For any PfaP_{fa} value the PmcP_{mc} was constant which was obvious from Eq.20. Increasing SNR not only improved PdP_{d} but also improved PmcP_{mc} as well. The PfaP_{fa} was chosen as an independent variable and swept on the range 0 to 11. Using Eq. 13, the threshold was calculated for a given SNR value. Further, Pd=1PmdP_{d}=1-P_{md} (the detection probability) and PmcP_{mc} were computed as average after doing 10510^{5} uniform realisations of nodes deployment. We observed that increasing the number of nodes does not affect the PdP_{d} but PmcP_{mc} increases with an increase in number of Alice nodes (MM). We further observed that the less the nodes (Alice nodes) remain idle during their allocated slot the more the PdP_{d} we had.

Refer to caption
(a) Noiseless ground truths
Refer to caption
(b) Nosiy ground truths
Figure 6: PmcP_{mc} vs estimation error σ2\sigma^{2}.

PmcP_{mc} is the probability of deciding ii-th Alice node, as any Alice node without ii. PmcP_{mc} becomes an important metric when dealing with multiple nodes’ identification. Here, PmcP_{mc} resulted from both transmitter identification’s algorithms (ML which is a bi-product of two-step HT based authentication and GMM). As GMM is a learning approach, it requires training data to learn its parameters. That is the reason that we only performed transmitter identification using GMM. We assumed no data was available for Eve nodes.

Fig. 6 (a) was generated by assuming actual ground truths (noiseless (Lii)(L_{i}\ \forall i)) of Alice nodes available for performing ML based transmitter identification. The ML was implemented using Eq.9 with having noiseless ground truths. Fig. 6 (a) shows that the two approaches perform equally. To test the efficacy of the GMM approach, we performed another experiment and plotted the results in Fig. 6 (b). This time we assumed that the ground truths of Alice nodes were noisy Li+niL_{i}+n\ \forall i (i.e when the ground truths were obtained on secure channel it also included noise or an error). This time the the ML based approach was implemented using Eq.9 to include noisy ground truths. The GMM parameters were estimated on 10410^{4} training data generated from the legal nodes and then tested on 10510^{5}. The error was calculated as number of times the estimated state was not equal to the actual value divided by the total transmissions for both approaches and for both cases. We observed from Fig. 6 (b) that the overall performance of GMM was improved. The performance improved even further for lower SNR or higher σ2\sigma^{2}.

VII Conclusion

This paper provided an authentication mechanism using path loss as a fingerprint at the physical layer in nanoscale communication systems operating in terahertz band. The work’s importance was advocated by illustrating envisioned smart healthcare application of nanoscale communication systems. The complex and quantum insecure crypto measures can be complemented using this approach which is simple and quantum secure (i.e. no encryption or shared secret key is involved). This was observed from ROC curves after doing monte carlo based simulation for nodes deployment under uniform distribution that with 20%20\% false rate the detection probability is almost one when operating with SNR =10=10 dB. A generic system was considered comprising multiple legal and malicious nano nodes operating in Terahetrz band. Specifically, for simulation purpose, nodes were deployed in 1m×1m1m\times 1m area under uniform distribution and air was considered as a medium among the nodes and path loss was calculated using HITRAN data base.

Acknowledgements

This work was made possible by NPRP grant number NPRP 10-1231-160071 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors. Waqas Aman would also like to thank Higher Education Commission of Pakistan for providing him IRSIP scholarship to travel to University of Glasgow for his studies.

References

  • [1] M. S. Islam and L. Vj, “Nanoscale materials and devices for future communication networks,” IEEE Communications Magazine, vol. 48, no. 6, pp. 112–120, 2010.
  • [2] I. F. Akyildiz, F. Brunetti, and C. Blázquez, “Nanonetworks: A new communication paradigm,” Computer Networks, vol. 52, no. 12, pp. 2260 – 2279, 2008. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128608001151
  • [3] F. Lemic, S. Abadal, W. Tavernier, P. Stroobant, D. Colle, E. Alarcón, J. Marquez-Barja, and J. Famaey, “Survey on terahertz nanocommunication and networking: A top-down perspective,” 2019.
  • [4] K. Yang, D. Bi, Y. Deng, R. Zhang, M. M. U. Rahman, N. A. Ali, M. A. Imran, J. M. Jornet, Q. H. Abbasi, and A. Alomainy, “A comprehensive survey on hybrid communication for internet of nano-things in context of body-centric communications,” 2019.
  • [5] J. Ma, R. Shrestha, J. Adelberg, and et al., “Security and eavesdropping in terahertz wireless links,” in Nature, vol. 563, 2018, p. 89–93.
  • [6] C. Gidney and M. Ekerå, “How to factor 2048 bit rsa integers in 8 hours using 20 million noisy qubits,” 2019.
  • [7] M. Shakiba-Herfeh, A. Chorti, and H. V. Poor, “Physical layer security: Authentication, integrity and confidentiality,” 2020.
  • [8] J. Yang, Y. Chen, W. Trappe, and J. Cheng, “Detection and localization of multiple spoofing attackers in wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 44–58, 2013.
  • [9] S. Zafar, W. Aman, M. M. U. Rahman, A. Alomainy, and Q. H. Abbasi, “Channel impulse response-based physical layer authentication in a diffusion-based molecular communication system,” in 2019 UK/ China Emerging Technologies (UCET), 2019, pp. 1–2.
  • [10] A. Mahmood, W. Aman, M. O. Iqbal, M. M. U. Rahman, and Q. H. Abbasi, “Channel impulse response-based distributed physical layer authentication,” in 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 2017, pp. 1–5.
  • [11] L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, “Using the physical layer for wireless authentication in time-variant channels,” IEEE Transactions on Wireless Communications, vol. 7, no. 7, pp. 2571–2579, 2008.
  • [12] P. Baracca, N. Laurenti, and S. Tomasin, “Physical layer authentication over mimo fading wiretap channels,” IEEE Transactions on Wireless Communications, vol. 11, no. 7, pp. 2564–2573, 2012.
  • [13] W. Hou, X. Wang, and J. Chouinard, “Physical layer authentication in ofdm systems based on hypothesis testing of cfo estimates,” in 2012 IEEE International Conference on Communications (ICC), 2012, pp. 3559–3563.
  • [14] ——, “Physical layer authentication in ofdm systems based on hypothesis testing of cfo estimates,” in 2012 IEEE International Conference on Communications (ICC), 2012, pp. 3559–3563.
  • [15] P. Hao, X. Wang, and A. Behnad, “Performance enhancement of i/q imbalance based wireless device authentication through collaboration of multiple receivers,” in 2014 IEEE International Conference on Communications (ICC), 2014, pp. 939–944.
  • [16] M. M. U. Rahman, Q. H. Abbasi, N. Chopra, K. Qaraqe, and A. Alomainy, “Physical layer authentication in nano networks at terahertz frequencies for biomedical applications,” IEEE Access, vol. 5, pp. 7808–7815, 2017.
  • [17] X. Liang, F. Hu, Y. Yan, and et al., “Secure thermal infrared communications using engineered blackbody radiation,” in Sci. Rep., vol. 4, 2015, p. 5245.
  • [18] I. Gordon, L. Rothman, and et al., “The hitran2016 molecular spectroscopic database,” Journal of Quantitative Spectroscopy and Radiative Transfer, vol. 203, pp. 3 – 69, 2017, hITRAN2016 Special Issue.
  • [19] J. M. Jornet and I. F. Akyildiz, “Channel capacity of electromagnetic nanonetworks in the terahertz band,” in 2010 IEEE International Conference on Communications, May 2010, pp. 1–6.
  • [20] ——, “Channel modeling and capacity analysis for electromagnetic wireless nanonetworks in the terahertz band,” IEEE Transactions on Wireless Communications, vol. 10, no. 10, pp. 3211–3221, October 2011.
  • [21] R. G. Cid-Fuentes, J. M. Jornet, I. F. Akyildiz, and E. Alarcon, “A receiver architecture for pulse-based electromagnetic nanonetworks in the terahertz band,” in 2012 IEEE International Conference on Communications (ICC), June 2012, pp. 4937–4942.
  • [22] M. M. U. Rahman, A. Yasmeen, and J. Gross, “Phy layer authentication via drifting oscillators,” in 2014 IEEE Global Communications Conference, Dec 2014, pp. 716–721.
  • [23] Q. Yan and R. S. Blum, “Distributed signal detection under the neyman-pearson criterion,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1368–1377, 2001.