Secure Physical Layer Voting

被引:6
|
作者
Ghose, Nirnimesh [1 ]
Hu, Bocan [1 ]
Zhang, Yan [1 ]
Lazos, Loukas [1 ]
机构
[1] Univ Arizona, Dept Elect & Comp Engn, Tucson, AZ 85721 USA
基金
美国国家科学基金会;
关键词
Physical-layer security; voting; OFDM; wireless; data fusion; RELIABILITY; CONSENSUS;
D O I
10.1109/TMC.2017.2738647
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed wireless networks often employ voting to perform critical network functions such as fault-tolerant data fusion, cooperative sensing, and reaching consensus. Voting is implemented by sending messages to a fusion center or via direct message exchange between participants. However, the delay overhead of message-based voting can be prohibitive when numerous participants have to share the wireless channel in sequence, making it impractical for time-critical applications. In this paper, we propose a fast PHY-layer voting scheme called PHYVOS, which significantly reduces the delay for collecting and tallying votes. In PHYVOS, wireless devices transmit their votes simultaneously by exploiting the subcarrier orthogonality of OFDM and without explicit messaging. Votes are realized by injecting energy to pre-assigned subcarriers. We show that PHYVOS is secure against adversaries that attempt to manipulate the voting outcome. Security is achieved without employing cryptography-based authentication and message integrity schemes. We analytically evaluate the voting robustness as a function of PHY-layer parameters. We extend PHYVOS to operate in ad hoc groups, without the assistance of a fusion center. We discuss practical implementation challenges related to multi-device frequency and time synchronization and present a prototype implementation of PHYVOS on the USRP platform. We complement the implementation with larger scale simulations.
引用
收藏
页码:688 / 702
页数:15
相关论文
共 50 条
  • [1] Generative AI for Secure Physical Layer Communications: A Survey
    Zhao, Changyuan
    Du, Hongyang
    Niyato, Dusit
    Kang, Jiawen
    Xiong, Zehui
    Kim, Dong In
    Shen, Xuemin
    Letaief, Khaled B.
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2025, 11 (01) : 3 - 26
  • [2] A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry
    Angueira, Pablo
    Val, Inaki
    Montalban, Jon
    Seijo, Oscar
    Iradier, Eneko
    Fontaneda, Pablo Sanz
    Fanari, Lorenzo
    Arriola, Aitor
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (02): : 810 - 838
  • [3] Secure Semantic Communications: From Perspective of Physical Layer Security
    Li, Yongkang
    Shi, Zheng
    Hu, Han
    Fu, Yaru
    Wang, Hong
    Lei, Hongjiang
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (10) : 2243 - 2247
  • [4] Secure Physical Layer Network Coding versus Secure Network Coding
    Hayashi, Masahito
    ENTROPY, 2022, 24 (01)
  • [5] Secure physical layer network coding versus secure network coding
    Hayashi, Masahito
    2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 430 - 434
  • [6] Secure Relay and Jammer Selection for Physical Layer Security
    Hui, Hui
    Swindlehurst, A. Lee
    Li, Guobing
    Liang, Junli
    IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (08) : 1147 - 1151
  • [7] On Secure CDRT With NOMA and Physical-Layer Network Coding
    Lei, Hongjiang
    She, Xusheng
    Park, Ki-Hong
    Ansari, Imran Shafique
    Shi, Zheng
    Jiang, Jing
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (01) : 381 - 396
  • [8] Performance Analysis of Secure GPSM Systems for Physical Layer Security
    Pang, Yashan
    Lei, Xia
    Xiao, Yue
    Li, You
    Xiang, Wei
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [9] Computational Secure Physical Layer Algorithm for MIMO Wireless Systems
    Mesleh, Raed
    Alouneh, Sahel
    Hiari, Omar
    IEEE SYSTEMS JOURNAL, 2024, 18 (02): : 805 - 813
  • [10] Physical Layer based Message Authentication with Secure Channel Codes
    Chen, Dajiang
    Zhang, Ning
    Cheng, Nan
    Zhang, Kuan
    Qin, Zhiguang
    Shen, Xuemin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 1079 - 1093