New physical layer security technology comprising an innovative secure channel training scheme that protects a two user NOMA system against eavesdropping attacks.

About

SUMMARY New physical layer security technology comprising an innovative secure channel training scheme that protects a two user non-orthogonal multiple access (NOMA) system against eavesdropping attacks. This technology improves the confidentiality level of the current and future wireless systems, more specifically in scenarios in which the transmission channel is shared by several terminals using a power domain NOMA scheme. CONTEXT In commercial wireless standards, the protection against eavesdropping attacks has been provided by cryptographic protocols. The secrecy provided by these protocols relies on the assumption that some complex mathematical problems would take thousands of years to be solved using conventional computing methods. However, with the recent progresses in the field of quantum processing, some of these problems will be solvable, making less secure the current cryptographic techniques. In wireless networks, one of the solutions to address these new threats in secrecy is physical layer security. The main area behind physical layer security is to use the channel dynamics to create uncertainty at the eavesdropper. Contrarily to what happens with commercial cryptosystems, in physical layer security the secrecy performance is quantified from an information theoretical perspective not relying on any type of technological limitation at the eavesdropper. This invention was designed and evaluated using physical layer security principles and comprises an innovative secure channel training scheme that protects a NOMA system against eavesdropping attacks coming from inside and outside of the network. APPLICATIONS This invention is targeted to support low throughput services with stringent secrecy requirements. All type of services that need to exchange small blocks of critical information with maximum secrecy are target applications. - Exchange of secret keys - Exchange of banking information, such as: - Credit card numbers - Passwords - Improving security of wireless networks - Secure network association BENEFITS - INDEPENDENCE OF COMPUTATIONAL CAPABILITIES AVAILABLE AT THE EAVESDROPPER: this solution assures high security performance, being resistant to attacks carried using advanced processing technologies (e.g. quantum computation). - PROTECTION AGAINST ATTACKS INSIDE AND OUTSIDE OF THE NETWORK: this invention considers not only the presence of undetectable passive eavesdroppers that remain located outside of the network, but also internal attacks coming from eavesdroppers registered as legitimate users inside the network. INTELLECTUAL PROPERTY USA patent pending (US17622971) European patent pending (EP20751285) Portuguese patent granted (PT115616) DEVELOPMENT STAGE TRL 2 - The evaluation of the present invention was done using already proved theorems and channel models widely acknowledged in the field of information theory and wireless communications, respectively. In a second stage, computer simulations were compared with the derived theoretical results. The hardware materialization of this invention is feasible using current state of art applying specific integrated circuit technologies. SCIENTIFIC PUBLICATIONS G. Anjos, D. Castanheira, A. Silva and A. Gameiro, "Securing Non-Orthogonal Multiple Access Systems Against Simultaneous Eavesdropping Attacks Coming from Inside and Outside of the Network," 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2019, pp. 1-7, doi: 10.1109/PIMRC.2019.8904169. G. Anjos, D. Castanheira, A. Silva and A. Gameiro, "A Method Exploiting the Channel-Training Phase to Achieve Secrecy in a Fading Broadcast Channel," in IEEE Transactions on Signal and Information Processing over Networks, doi: 10.1109/TSIPN.2022.3161086. TARGET MARKET This type of technology targets a generation of mobile communications beyond 5G. IT seeks partners among companies that manufacture chip for wireless communications. COMMERCIAL OFFERING Licensing agreement Testing new applications Joint further developments TECHNOLOGY ID PI-1009 #PhysicalLayerSecurity #PLS #NonOrthogonalMultipleAccess #NOMA #SecureChannelTraining #CooperativeJamming #Eavesdropping

Key Benefits

- INDEPENDENCE OF COMPUTATIONAL CAPABILITIES AVAILABLE AT THE EAVESDROPPER: this solution assures high security performance, being resistant to attacks carried using advanced processing technologies (e.g. quantum computation). - PROTECTION AGAINST ATTACKS INSIDE AND OUTSIDE OF THE NETWORK: this invention considers not only the presence of undetectable passive eavesdroppers that remain located outside of the network, but also internal attacks coming from eavesdroppers registered as legitimate users inside the network.

Applications

This invention is targeted to support low throughput services with stringent secrecy requirements. All type of services that need to exchange small blocks of critical information with maximum secrecy are target applications. - Exchange of secret keys - Exchange of banking information, such as: - Credit card numbers - Passwords - Improving security of wireless networks - Secure network association

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations