Graph Layer Security: Encrypting Information via Common Networked Physics

06/05/2020
by   Zhuangkun Wei, et al.
0

The proliferation of low cost Internet of Things (IoT) devices demands new encryption mechanisms over their wireless communication channel. Traditional public key cryptography (PKC) demands high computational power and is not suitable for low power IoT devices, making them vulnerable to more powerful eavesdroppers. Recent advances in physical layer security (PLS) exploits common wireless channel statistics to generate symmetrical keys, but require accurate channel estimation and a high communication signal-to-noise ratio (SNR). As most embedded and underground IoT devices operate in low communication SNR regimes, they cannot reliably use either PKC nor PLS encryption. Many IoT devices monitor underground networked assets such as water, oil, gas, and electrical networks. Here, we propose to exploit the monitored physical dynamics data to act as a basis for encrypting the digital information. Graph Layer Security (GLS) is proposed for the first time here, as a way to encode networked physical assets' information via their graph signal processing properties. Our approach is premised on the exploitation of networked correlation in nonlinear physical dynamics for encryption and decryption. We achieve this using Koopman operator linearisation and Graph Fourier Transform (GFT) sparsification. The resulting GLS encryption scheme, like PLS, do not require the exchange of keys or a public key, and is not reliant on wireless channel properties. Using real world examples, we demonstrate remarkably secure wireless communication encryption. We believe the technology has widespread applicability in secure health monitoring for Digital Twins in challenging radio environments and conclude our seminal paper with a discussion on future development challenges.

READ FULL TEXT

page 1

page 2

research
05/26/2023

Attacks on Continuous Chaos Communication and Remedies for Resource Limited Devices

The Global Wearable market is anticipated to rise at a considerable rate...
research
05/31/2019

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT

As the Internet of Things (IoT) emerges over the next decade, developing...
research
03/18/2019

A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics

The increasing prevalence of Internet of Things (IoT) devices has made i...
research
10/18/2019

Physical Layer Encryption using a Vernam Cipher

Secure communication is a necessity. However, encryption is commonly onl...
research
11/04/2017

Secure Communications using Nonlinear Silicon Photonic Keys

We present a secure communication system constructed using pairs of nonl...
research
05/06/2020

Preprint: Using RF-DNA Fingerprints To Classify OFDM Transmitters Under Rayleigh Fading Conditions

The Internet of Things (IoT) is a collection of Internet connected devic...
research
11/27/2018

Cross-Technology Communications for Heterogeneous IoT Devices Through Artificial Doppler Shifts

Recent years have seen major innovations in developing energy-efficient ...

Please sign up or login with your details

Forgot password? Click here to reset