{"id":105,"date":"2023-03-13T15:44:32","date_gmt":"2023-03-13T19:44:32","guid":{"rendered":"https:\/\/sites.bu.edu\/wisecircuits\/?page_id=105"},"modified":"2024-01-17T09:22:17","modified_gmt":"2024-01-17T14:22:17","slug":"secure-wireless-communication","status":"publish","type":"page","link":"https:\/\/sites.bu.edu\/wisecircuits\/secure-wireless-communication\/","title":{"rendered":"Secure Wireless Communications"},"content":{"rendered":"<p><script src=\"https:\/\/cdn.jsdelivr.net\/npm\/bootstrap@5.0.2\/dist\/css\/bootstrap.min.css\" rel=\"stylesheet\" integrity=\"sha384-EVSTQN3\/azprG1Anm3QDgpJLIm9Nao0Yz1ztcQTwFspd3yD65VohhpuuCOmLASjC\" crossorigin=\"anonymous\">\r\n<script src=\"https:\/\/cdn.jsdelivr.net\/npm\/bootstrap@5.3.0-alpha1\/dist\/css\/bootstrap.min.css\" rel=\"stylesheet\">\r\n<script src=\"https:\/\/getbootstrap.com\/docs\/5.3\/assets\/css\/docs.css\" rel=\"stylesheet\">\r\n<script src=\"https:\/\/cdn.jsdelivr.net\/npm\/bootstrap@5.3.0-alpha1\/dist\/js\/bootstrap.bundle.min.js\"><\/script><\/p>\n<h2><strong>Overview<\/strong><\/h2>\n<p align=\"justify\">Security plays a crucial role in the design of low-power connected sensors and edge devices. The potential threats to intelligent wireless systems are particularly hazardous due to the sensitive nature of the exchanged data. Given the stringent constraints on energy and computation resources, relying solely on cryptographic mechanisms for device security is not sufficient. To bolster the security of intelligent sensing and communication systems, our approach is to: (1) identify security vulnerabilities in intelligent sensors; (2) develop innovative countermeasures that leverage the distinctive characteristics of the physical layer; (3) provide tangible demonstrations of these solutions in energy-efficient integrated hardware systems; and (4) analyze performance trade-offs associated with embedding security in integrated intelligent sensor hardware.<\/p>\n<h3><strong>Energy- and Spectrally-Efficient Wireless Systems Embedding Security:<br \/>\n<\/strong><\/h3>\n<div class=\"clearfix\">\n<p><img src=\"\/wisecircuits\/files\/2024\/01\/Copy-of-TB_MIMO_v8-Page-2-1024x764.png\" class=\"col-md-7 float-md-end mb-3 ms-md-3\" alt=\"...\" \/><\/p>\n<h6><strong>Collaborators: <\/strong><\/h6>\n<h6>Prof. Yonina Eldar \u2013 Weizmann Institute of Science, Prof. Nir Shlezinger \u2013 Ben-Gurion University of the Negev, Dr. Lei Poo \u2013 Analog Devices, Dr. Tao Yu \u2013 Analog Devices, Dr. Benoit Dufort \u2013 Analog Devices<\/h6>\n<h6><strong>Funding: <\/strong> Semiconductor Research Corporation, Analog Devices (ADI)<\/h6>\n<h6><strong>Team: <\/strong> Timur Zirtiloglu (Lead RF Integrated Circuit Designer), Arman Tan, Arslan Riaz, Alperen Yasar (Lead Secure Integrated Circuit Designer), Eyyup Tasci (Visiting Undergraduate Researcher), Peter Crary<\/h6>\n<p align=\"justify\">Traditional radio-frequency (RF) systems employ brute-force data acquisition through high-resolution quantization and Nyquist sampling rates, resulting in elevated power consumption and hardware design complexity. To address these challenges, we advocate for the integration of information-centric algorithms in the design of agile RF receivers. This approach aims to achieve heightened spectrum utilization while minimizing energy consumption, thereby mitigating the overhead of embedding security measures in the physical layer. It is crucial to tackle security concerns at the physical-layer-design level rather than treating them as an afterthought in software or digital algorithms, especially for future sensing and communication systems.<\/p>\n<p align=\"justify\">The attack surface at the physical layer can exploit hardware vulnerabilities through side-channel attacks and fundamental RF\/analog signal and channel parameters. To establish secure analog\/RF circuits and wireless sensing systems, understanding and analyzing these vulnerabilities using universal metrics are essential. Mitigating these vulnerabilities requires the development of hardware-algorithmic techniques that leverage the unique characteristics of the physical layer and integrated circuit components for security. Choosing appropriate security protocols and RF\/analog security primitives necessitates a systematic study of performance trade-offs, considering factors such as energy consumption, latency, and area implications, especially in tightly constrained systems.<\/p>\n<\/div>\n<div style=\"display: flex; justify-content: space-between;\">\n<div style=\"flex-basis: 30%;\">\n<h5><strong>Publications:<\/strong><\/h5>\n<ul style=\"padding: 10; text-align: justify;\">\n<li><a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3517809\" style=\"text-decoration: none; color: #007bff;\">ACM JETC 2022<\/a><\/li>\n<li><a href=\"https:\/\/arxiv.org\/abs\/2212.00107\" style=\"text-decoration: none; color: #007bff;\">arXiv 2022 (preprint)<\/a><\/li>\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10347945\" style=\"text-decoration: none; color: #007bff;\">IEEE A-SSCC 2023<\/a><\/li>\n<li><a href=\"https:\/\/arxiv.org\/abs\/2312.10966\" style=\"text-decoration: none; color: #007bff;\">arXiv 2023 (preprint, under review)<\/a><\/li>\n<\/ul>\n<\/div>\n<div style=\"flex-basis: 50%;\">\n<h5><strong>Tutorials:<\/strong><\/h5>\n<ul style=\"padding: 10;\" align=\"justify\">\n<li><a href=\"http:\/\/chrome-extension:\/\/efaidnbmnnnibpcajpcglclefindmkaj\/https:\/\/submissions.mirasmart.com\/ISSCC2023\/PDF\/ISSCC2023AdvanceProgram.pdf\" style=\"text-decoration: none; color: #007bff;\">IEEE ISSCC 2023<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h3><strong>GRAND-EDGE:<\/strong><\/h3>\n<div class=\"clearfix\">\n<h6><strong>Collaborators: <\/strong><\/h6>\n<h6>Prof. Muriel M\u00e9dard &#8211; MIT EECS, \u00a0Prof. Ken Duffy &#8211; Northeastern University ECE,\u00a0Prof. David Starobinski \u2013 BU ECE<\/h6>\n<h6><strong>Funding: <\/strong> <a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2128517&amp;HistoricalAwards=false\">NSF SWIFT<\/a>, DARPA<\/h6>\n<h6><strong>Team: <\/strong>Dr. Furkan Ercan (Lead Designer), Kevin Galligan (Ken Duffy\u2019s Ph.D. student)<\/h6>\n<p align=\"justify\">The presence of random jammers, capable of overpowering transmitted signals, presents a practical challenge for various wireless communication protocols. Consequently, wireless receivers must adeptly manage both standard channel noise and deliberate or unintentional jamming. Addressing this challenge, we proposed an innovative method to bolster the resilience of the recent family of universal error-correcting GRAND algorithms. This approach, named Erasure Decoding by Gaussian Elimination (EDGE), specifically influences the syndrome check block and is applicable to any GRAND variant. Our simulations demonstrated that the EDGE variants markedly diminish both the Block Error Rate (BLER) and computational complexity by up to five orders of magnitude when compared to the original GRAND and ORBGRAND algorithms.<\/p>\n<\/div>\n<div style=\"display: flex; justify-content: space-between;\">\n<div style=\"flex-basis: 30%;\">\n<h5><strong>Publications:<\/strong><\/h5>\n<ul style=\"padding: 10;\" align=\"justify\">\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/document\/10279273\" style=\"text-decoration: none; color: #007bff;\">IEEE ICC 2023<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<h3><strong>Security Strategy for Soft Decoding Against Smart Bursty Jammers:<br \/>\n<\/strong><\/h3>\n<div class=\"clearfix\">\n<h6><strong>Collaborators: <\/strong><\/h6>\n<h6>Prof. Muriel M\u00e9dard &#8211; MIT EECS, \u00a0Prof. Ken Duffy &#8211; Northeastern University ECE,\u00a0Prof. David Starobinski \u2013 BU ECE<\/h6>\n<h6><strong>Funding: <\/strong> <a href=\"https:\/\/www.nsf.gov\/awardsearch\/showAward?AWD_ID=2128517&amp;HistoricalAwards=false\">NSF SWIFT<\/a>, DARPA<\/h6>\n<h6><strong>Team: <\/strong>Dr. Furkan Ercan (Lead Designer), Kevin Galligan (Ken Duffy\u2019s Ph.D. student)<\/h6>\n<p align=\"justify\">Jamming attacks pose a threat to wireless communication, potentially causing significant disruptions or complete denial of service (DoS). Detecting these attacks is challenging due to the growing sophistication of jamming devices. While forward error correction is commonly used to mitigate channel noise, it becomes less reliable in the presence of jammers, leading to a decline in error correction performance. Bursty jammers have a more pronounced impact than non-bursty ones, as traditional decoders assume independent noise occurrence for each bit.<\/p>\n<p style=\"font-weight: 400;\">\n<p align=\"justify\">However, we propose a solution leveraging temporal dependencies to identify jammed bits, introducing a pre-decoding step that updates log-likelihood ratio (LLR) reliability information without modifying the decoding algorithm. Our method enhances decoding performance, accurately detecting a significant proportion of jamming in received frames. Applied to specific decoding algorithms like ORBGRAND, our approach reduces the block-error rate (BLER) by an order of magnitude for selected codes, preventing a complete DoS at the receiver.<\/p>\n<\/div>\n<div style=\"display: flex; justify-content: space-between;\">\n<div style=\"flex-basis: 30%;\">\n<h5><strong>Publications:<\/strong><\/h5>\n<ul style=\"padding: 10;\" align=\"justify\">\n<li><a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10008541\" style=\"text-decoration: none; color: #007bff;\">IEEE Globecom Workshops 2022<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview Security plays a crucial role in the design of low-power connected sensors and edge devices. The potential threats to intelligent wireless systems are particularly hazardous due to the sensitive nature of the exchanged data. Given the stringent constraints on energy and computation resources, relying solely on cryptographic mechanisms for device security is not sufficient. [&hellip;]<\/p>\n","protected":false},"author":22240,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/no-sidebars.php","meta":[],"_links":{"self":[{"href":"https:\/\/sites.bu.edu\/wisecircuits\/wp-json\/wp\/v2\/pages\/105"}],"collection":[{"href":"https:\/\/sites.bu.edu\/wisecircuits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.bu.edu\/wisecircuits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/wisecircuits\/wp-json\/wp\/v2\/users\/22240"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.bu.edu\/wisecircuits\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":23,"href":"https:\/\/sites.bu.edu\/wisecircuits\/wp-json\/wp\/v2\/pages\/105\/revisions"}],"predecessor-version":[{"id":1266,"href":"https:\/\/sites.bu.edu\/wisecircuits\/wp-json\/wp\/v2\/pages\/105\/revisions\/1266"}],"wp:attachment":[{"href":"https:\/\/sites.bu.edu\/wisecircuits\/wp-json\/wp\/v2\/media?parent=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}