Next Article in Journal
A Novel Chaotic System with a Line Equilibrium: Analysis and Its Applications to Secure Communication and Random Bit Generation
Previous Article in Journal
Effects of Interference and Mitigation Using Notch Filter for the DVB-S2 Standard
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dependable Wireless System with Shortened Code Using Distance Information between Integrated Terminals

Graduate School of Engineering Science, Yokohama National University, Yokohama 240-8501, Japan
*
Author to whom correspondence should be addressed.
Submission received: 4 November 2020 / Revised: 2 December 2020 / Accepted: 3 December 2020 / Published: 7 December 2020

Abstract

:
Since wireless systems allow for easier access to communication paths than wired systems, it is necessary to improve their dependability against cyberterrorists. To make wireless systems more dependable, additional measures at the lower layer are required, in addition to those at the upper layers. Our proposal uses an integrated terminal-like cellular phone which has multiple radio access technologies (RATs) such as cellular, wireless local area network (LAN), Bluetooth, and an ultra-wide band (UWB). We propose to communicate information encoded by shortened code using multiple RATs. Redundancy by RATs and their error correction capability can simultaneously improve wiretap resistance and attack resistance. A codeword of shortened code is obtained by removing a part of a codeword of popular code. A decoder can improve the error correction capability if the removed part is known. By using shortened codes, the dependability can be further enhanced because the error correction capability between the legitimate receiver and the cyberterrorist can make a difference. To do this, it is necessary to securely share the removed part between the sender and receiver. Our proposal is to securely measure the distance between the sender and receiver using UWB and use it as the removed part. It was confirmed that the secrecy capacity is improved.

1. Introduction

Since fifth-generation mobile communication systems (5G) can provide high performance such as high data rate or capacity, ultra-low latency, and massive connectivity, 5G is expected to be applied to various applications [1]. Although sixth-generation mobile communication systems are being researched for extreme high performance over 5G, one of the most important concepts is network dependability. If a wireless sensor network (WSN) is not able to report critical alerts due to a network failure such as the crash of a node and battery exhaustion, it has been pointed out that it may cause severe failures with dangerous consequences. Examples of such critical applications are health monitoring, ambient intelligent systems, and environmental monitoring. Therefore, when using WSNs in critical applications, it is important to verify their reliability properties based on heuristic strategies such as “what-if analysis” and “robustness checking” at design time [2]. In addition to trustworthiness, dependability of WSN is also related to attributes like safety and security [3]. Therefore, the proper management of these attributes could avoid economic losses and danger to people or to the system [4,5]. Taking this into account, since WSNs provide easier access to communication channels than wired networks, measures should be taken not only for the crash of a node and battery exhaustion, but also for human-induced wiretapping such as packet sniffing and attacks such as jamming.
Although countermeasures against wiretapping and attacks have been studied individually, countermeasures against cyberterrorists who can wiretap and attack simultaneously are necessary. Typically, countermeasures against wiretapping and attacks are implemented with cryptography [6] and authentication [7] at higher layers. To make a wireless system more dependable, it is necessary to take additional measures at lower layers.
We propose that a terminal with multiple radio access technologies (RATs), such as a cellular phone, defined as an integrated terminal, communicates using multiple RATs. If multiple RATs are used for communication, even if one RAT is attacked by a cyberterrorist, the receiver can recover the original information by using the information received from the sender via the other RATs. However, if the sender transmits the same information using multiple RATs, the cyberterrorist can obtain the original information with only one RAT wiretapping. Therefore, we propose the forward error correction (FEC) coding of information. There are still issues. If there are not enough RATs available, countermeasures against wiretapping and attacks cannot be realized simultaneously.
If there are two RATs available, the sender encodes in a way that the cyberterrorist cannot obtain the original information even if one RAT is wiretapped. If the cyberterrorist attacks one RAT instead of wiretapping, the receiver cannot obtain the original information. We use shortened code as an FEC code. Shortened code is obtained by adding a simple modification to a known code [8]. We propose to use distance information between the sender and the receiver as the shortened information used for the encoding and decoding of shortened code.
The mutual information is used as an evaluation index of the attack resistance. It is a measure of the mutual dependence between the two variables [9]. It is the index suitable for evaluating how much information can be shared between the sender and the receiver under an attack. The secrecy capacity is used as an evaluation index of the wiretapping resistance. It is defined as the maximum transmission rate between the sender and the receiver with no information available to the cyberterrorist [10].
The remainder of this paper is organized as follows. Section 2 presents related work. In Section 3, the system configuration of the proposed dependable wireless system is described. Performance evaluations are provided in Section 4. Conclusions and suggestions for future research are presented in Section 5.

2. Related Works

Cryptography is commonly used as a countermeasure against wiretapping, and authentication is commonly used as a countermeasure against attacks. Cryptography is classified into common key cryptography and public key cryptography [6]. The common key cryptography performs encryption and decryption using the common key in the sender and the receiver. Therefore, it is necessary for the sender and the receiver to share the key which is known to no one else [6]. On the other hand, public key cryptography involves the receiver publishing the public key, the sender encrypts information using the public key, and the receiver decrypts it using the private key paired with the public key. Although public key encryption does not require key sharing, many studies have been conducted to discover public keys securely and efficiently [11,12,13].
Authentication includes password authentication, biometric authentication, and one-time password authentication [7]. Password authentication uses passwords that are registered on the authentication server. Only users who know the password can be authenticated. Biometric authentication uses biometric information as the password. It has a lower risk of forgery, theft, and forgetting than a password. One-time password authentication is effective as a countermeasure against forgery and theft because the password is changed every time.
These are countermeasures for the upper layer, but countermeasures for the lower layer—that we are targeting—are also being studied.
As countermeasures against wiretapping at the lower layer, there are key generation methods using biometric and physical information. Examples of physical information are channel state information, received signal strength indicators, distance, angle of arrival, and so on [14,15]. Biometric information is specific to each user, and physical information is specific to the location of the user. Using user-specific information, keys can be created securely. For this reason, attempts to use biometric information for authentication have been made for a long time, and it has been used practically for unlocking cellular phones. Distance or location information measured by an ultra-wide band (UWB) is applied for keyless entry authentication to prevent relay attacks for unlocking automobiles [16], and it is expected to be put into practical use soon. These key generation methods can also be used for our proposed shortened information. We select the distance information considering the accuracy and feasibility of cellular phones.
Shamir’s secret sharing has been applied to multiple communication channels [17]. Shamir’s secret sharing is an algorithm in cryptography [18]. Information is divided into multiple parts of distributed information using polynomials and shared. To reconstruct the original information, a certain number of parts are required. Shamir’s secret sharing is not efficient in communication, and many studies have been conducted to solve this problem [19,20,21]. In [17], when encrypted information is transmitted using multiple channels, the encryption key for the information is encrypted by using Shamir’s secret sharing and transmitted through multiple channels, thereby achieving highly reliable communication. We used the concept of secret sharing, but our proposal uses shortened code to transmit more efficiently and to increase attack resistance simultaneously.
As countermeasures against attacks at the lower layer, improvements are made to the signal-to-noise ratio (SNR) by a smart antenna composed of multiple antennas [22]. Beamforming is realized by adjusting the phase and amplitude of each antenna. The sender can increase the SNR of the receiver by directing the beam toward the receiver. The sender can decrease the SNR of the cyberterrorist by directing the null to the cyberterrorist. This study differentiates the reception performance of the receiver and the cyberterrorist by the directivity of the antenna, but our proposal differentiates between them by the error correction capability.
Packet duplication is a technique to improve reliability by transmitting the same packet over multiple redundant parallel links [23]. Although it is the same as using multiple redundant parallel links, our proposal can increase attack resistance to a greater degree than this study because it sends encoded information.
Frequency hopping is a technique used in Bluetooth. By periodically changing the frequency used for communication, attack resistance is increased. In [24], an adaptive frequency hopping method which changes to a new frequency only when the packet drop rate of the channel beyond a given threshold is proposed. The adaptive frequency hopping can increase the network reliability by 10–20%. We have always used multiple RATs, but we would like to consider selecting the RATs by scheduling.
The novelty of our proposal is to communicate information encoded by shortened code using multiple RATs. Redundancy by RATs and error correction capability can simultaneously improve wiretap resistance and attack resistance. By using shortened codes, the dependability can be further enhanced because the error correction capability between the receiver and the cyberterrorist can make a difference. To do this, the distance between the sender and the receiver is shared securely using UWB.

3. Dependable Wireless System

3.1. System Configuration

Figure 1 shows the proposed dependable wireless system. The terminal is an integrated terminal with multiple RATs such as cellular, UWB, Bluetooth, wireless local area network (LAN), and so on. Integrated terminals are commonplace because many cellular phones have cellular, Bluetooth, wireless LAN, and the iPhone 11 and 12 already have UWB chips, U1 chips, and many future cellular phones will have UWB chips. UWB is a technology which enables both communication and ranging [25]. Integrated terminals are equipped with an FEC coder–decoder (CODEC), and the encoded information is divided and communicated using multiple RATs simultaneously. Even if some RATs are attacked, the transmitted information can be recovered using encoded information received by other RATs. Even if some RATs are wiretapped, the transmitted information cannot be recovered using less encoded information. Thus, the proposed system is a realistic system that can be implemented with cellular phones to improve the information-theoretic security capability against wiretapping and attacks.

3.2. Shortened Code

The definitions of terms and symbols used in Section 3.2 are listed in Table 1.
We propose to adopt shortened code [8] as the FEC code. Figure 2 shows the encoding procedure of ( n m , k m ) shortened code. The unencoded bits are encoded with ( n , k ) code, where k is the unencoded bit length, n is the codeword length. The unencoded bits consists of m ( m   > 1) bits shortened information and k m bits information. The codeword of shortened code is obtained by removing m bits shortened information from the codeword of ( n , k ) code. ( n m , k m ) shortened code uses only a limited number of codewords in ( n , k ) code, and the minimum distance of ( n m , k m ) shortened code is not smaller than the minimum distance of ( n , k ) code.
If ( n , k ) code can correct t bit errors, the efficiency is defined as E .
E = t n
( n m , k m ) shortened code can correct t bit errors, if the decoder uses the shortened information. The efficiency E y is expressed by the following equation.
E y = t n m
From Equations (1) and (2), the relationship between E and E y is as follows.
E < E y
This indicates that the error correction capability is improved by shortening, and the same error rate can be obtained at a lower SNR than before shortening under an additive white Gaussian noise (AWGN) channel. If the decoder does not use the shortened information, only s ( s t ) bit errors can be corrected by the decoder. The efficiency E z is expressed by the following equation.
E z = s n m
Since the decoder does not use the shortened information, it is easy to imagine that s decreases rapidly as m increases. The relation between E z and E is as follows.
E z E
If the sender and the receiver share the shortened information, and the sender and the cyberterrorist do not share the shortened information, by changing the shortened information length, it is possible to provide a gap in the required SNR for the receiver and the cyberterrorist. To realize this, the shortened information must be shared securely between the sender and the receiver. Then, countermeasures against wiretapping and attacks can be realized simultaneously.
We adopted shortened repeat-accumulate (RA) code as the shortened code from the viewpoint that the construction of the encoder is simple, but it is also applicable to the Turbo code, low-density parity check (LDPC) code, and Polar code used in 5G. RA code is a code which was proposed in 1998 by Divsalar et al. [26]. Figure 3 shows the structure of systematic RA code encoder. Define q as the number of copies of a bit in the repeater and r as the number of additions of bits in the combiner. The parameters q and r are important factors that determine the characteristics of the code. The parity check matrix of systematic RA code is shown in Figure 4. The number of 1’s in the column of information bits is called the column weight, and its number is equal to q . The number of 1’s in the row of information bits is called the row weight, and its number is equal to r . When designing RA codes, the number and position of 1′s are important parameters which affect the characteristics. As seen from the parity check matrix, it can also be considered as a low-density generator matrix (LDGM) code [27] which is a kind of LDPC code [28]. Therefore, RA code can be decoded by an algorithm such as message passing as in LDPC code, and its characteristics are close to the Shannon limit.

3.3. Sharing Method of Shortened Information

To provide high error correction capability to the receiver and low error correction capability to the cyberterrorist, the sender and the receiver need to share the shortened information securely. We propose to use distance information between integrated terminals as the shortened information. Distance information is measured by UWB which performs ranging and positioning with high resolution in the order of centimeters because it communicates over a wide band using pulses with short time intervals in the order of nanoseconds [29]. Therefore, it can be treated as confidential information that can be only known between integrated terminals in a practical wireless system.
In June 2020, IEEE 802.15.4z, a standard of UWB with an enhanced reliability ranging method, was approved [30]. IEEE 802.15.4z specifies three ranging methods: single-sided two-way ranging (SS-TWR), double-sided two-way ranging (DS-TWR), and time difference of arrival (TDOA). Here, DS-TWR, in which distance information can be shared between the terminals, will be described using Figure 5.
First, a message frame is sent from terminal A to terminal B. Terminal B then sends a message frame to terminal A. Terminal A measures the round-trip time, R a , and if the reply time of terminal B, D b , is known, Equation (6) can be used to calculate the propagation time T ^ f . The distance between terminal A and terminal B is obtained by multiplying T ^ f by the speed of light. This is SS-TWR.
T ^ f = 1 2 ( R a D b )
The disadvantage of SS-TWR is that when the reply time becomes large, the measurement accuracy degrades due to the influence of the clock error between terminals A and B. Therefore, a message frame is further sent from terminal A to terminal B, and the effect of the clock error between terminals A and B is minimized by calculating using Equation (7). This is DS-TWR.
T ^ f = R a R b D a D b R a + D a + R b + D b

4. Performance Evaluation and Discussion

4.1. Secrecy Capacity

The definitions of terms and symbols used in Section 4.1 are listed in Table 2.
The sender and the receiver are communicating, and their communications are tapped by a cyberterrorist. The maximum transmission rate between the sender and the receiver when the cyberterrorist cannot receive any information is called the secrecy capacity. Wyner showed that for discrete memoryless channels, the secrecy capacity is the difference between the channel capacity of the receiver and the cyberterrorist [10,31]. This result has been generalized to Gaussian channels by Leung [32]. We use the secrecy capacity as an evaluation index of the wiretapping resistance. If C y is the channel capacity of the receiver under attack and C z is the channel capacity due to wiretapping by the cyberterrorist, the secrecy capacity, C can be calculated by the following Equation [31].
C = C y C z
Information transmitted by the sender is represented by X = { x 1 = 0 ,   x 2 = 1 } , information received by the receiver under attack is represented by Y = { y 1 = 0 ,   y 2 = 1 } , and information obtained by the cyberterrorist through wiretapping is represented by Z = { z 1 = 0 ,   z 2 = 1 } . The entropies of X ,   Y and Z are represented by H ( X ) , H ( Y ) , and H ( Z ) , respectively. The entropy H ( X ) is given by the probability P ( x i ) of x i as Equation (9).
H ( X ) = i = 1 2 P ( x i ) log 2 ( P ( x i ) )
H ( Y ) and H ( Z ) can be calculated in the same way as Equation (9). The amount of information shared by the receiver with the sender can be calculated by the mutual information I ( X ; Y ) as follows.
I ( X ; Y ) = H ( Y ) H ( Y | X )
In this paper, Y corresponds to the received information corrected by the shortened RA code. If D is the error that could not be corrected, Y can be expressed as Equation (11).
Y = X + D
If X and D are independent, Equation (10) can be transformed into Equation (12).
I ( X ; Y ) = H ( Y ) H ( X + D | X ) = H ( Y ) H ( D )
If P ( x 1 ) = P ( x 2 ) = 1 / 2 , P ( y 1 ) = P ( y 2 ) = 1 / 2 , and D is a random error with an error rate P e y , the mutual information I ( X ; Y ) is given by Equation (13) which is equal to the channel capacity.
I ( X ; Y ) = 1 + P e y log 2 ( P e y ) + ( 1 P e y ) log 2 ( 1 P e y ) = C y
Similarly, Z corresponds to the received information corrected by the shortened RA code, P ( z 1 ) = P ( z 2 ) = 1 / 2 , and the error is a random error with an error rate of P e z , the mutual information between the sender and the cyberterrorist is expressed by Equation (14).
I ( X ; Z ) = 1 + P e z log 2 ( P e z ) + ( 1 P e z ) log 2 ( 1 P e z ) = C z
If the information from the sender is completely received, P e y = 0. By substituting P e y = 0 into Equation (13) the mutual information I ( X ; Y ) becomes 1. If the information from the sender cannot be received at all and X and Y are independent with P ( x 1 ) = P ( x 2 ) = 1 / 2 and P ( y 1 ) = P ( y 2 ) = 1 / 2 , P e y = 0.5. By substituting P e y = 0.5 into Equation (13) the mutual information I ( X ; Y ) becomes 0. I ( X ; Z ) can be calculated in the same way as I ( X ; Y ) . From Equations (13) and (14), it can be proven that when the information from the sender can be completely received, the mutual information becomes 1, and when the information cannot be received at all, the mutual information becomes 0. We measured the bit error ratio (BER) by simulation under the above assumption.

4.2. Simulation Conditions

Figure 6 shows the evaluated simulation model with one sender, one receiver and one cyberterrorist. The sender and the receiver can use up to three RATs for communication. In the evaluation, it is assumed that the distance between the sender and the receiver is accurately measured using UWB. Assuming that the distance is always changing, distance information with the length of shortened information is generated by the uniform random number for each codeword using the function of MATLAB. The sender and the receiver use the same value of distance information. Assuming that the cyberterrorist cannot get any distance information at all, a random value independent of distance information is used for the cyberterrorist. Details of shortened RA code parameters are described in Section 4.3. The encoder and decoder of the RA code use the function of the Communications Toolbox of MATLAB. A total of 5 million codewords were simulated. Codewords of shortened RA code are defined as c ( 0 ) ,   c ( 1 ) , c ( 2 ) , ,   c ( n m 1 ) . Assuming communication using two RATs with almost the same capability, such as 2.4 GHz band and 5 GHz band of wireless LAN, c ( 0 ) ,   c ( 2 ) ,   c ( 4 ) , ,   c ( n m 2 ) are assigned to the first RAT and c ( 1 ) ,   c ( 3 ) , c ( 5 ) , ,   c ( n m 1 ) are assigned to the second RAT. When three RATs are used for communication, codewords are allocated sequentially from the beginning as in the case of two RATs. Since the codewords are distributed equally to each RAT in this manner, the wiretapping resistance and the attack resistance of each RAT are equal. The communication model will be described. If RAT communication is completely lost due to the attack, the received codeword is a random value. So, the codewords received via the attacked RAT are generated by the uniform random number of MATLAB for each decoding process. The unattacked RAT has no communication errors. So, the codewords received via the unattacked RAT for the decoder are the same codewords assigned by the RAT. The cyberterrorist shall be able to wiretap and attack simultaneously. In other words, when two RATs are used for communication, one RAT can be wiretapped while the other RAT can be attacked simultaneously. We confirm the information-theoretic effect by evaluating the mutual information between the sender and the receiver when some RATs are attacked and the mutual information between the sender and the cyberterrorist when some RATs are wiretapped. Then, we confirm the information-theoretic security capability against wiretapping and attacks by using the secrecy capacity.

4.3. Performance of Shortened RA Code

Table 3 shows the parameters of the shortened RA code used in this evaluation. As the RA code used for the shortened RA code, a code with 600 bits of unencoded bit length k , 1200 bits of codeword length n , and 3 of column weight q was designed. The interleaver after the repeater is a random interleaver, and the row weight r is uniquely determined by the random interleaver. The shortened information length m using distance information is varied from 0 to 500. The LogMAP algorithm was used as a decoding algorithm, and the maximum number of repetitions was set to 100.
Figure 7 and Figure 8 show the BER of the designed shortened RA code under the AWGN channel. Figure 7 shows the BER characteristics of the receiver for which the shortened information is known. The BER characteristics are improved as the shortened information length is increased. When the shortened information length is 300, it corresponds to the coding rate R = (600 − 300)/(1200 − 300) = 1/3. Theoretically, as compared with the coding rate R = 1/2 before shortening, 10 log 10 ( 3 / 2 ) = 1.76 (dB) characteristic improvement can be expected, but almost the same improvement has been obtained. Figure 8 shows the BER characteristic of the cyberterrorist for which the shortened information is unknown. Here, it is assumed that the cyberterrorist knows about shortened code other than the shortened information, e.g., the parity check matrix. The BER characteristics degrade as the length of the shortened information is increased. When the shortened information length is 100 bits, the required SNR difference between the receiver and the cyberterrorist at BER = 10 4 is 0.9 dB, while when the shortened information length is 400 bits, it is expanded to 6.2 dB. From this, it was confirmed that providing the receiver with a high correction capability and the cyberterrorist with a low correction capability can be achieved by using the designed shortened RA code.

4.4. Performance of UWB Ranging

Dacawave’s MDEK1001 Development Kit was used to evaluate the accuracy of ranging using UWB. The measurement results of 36 nodes when the anchor nodes were placed at the positions of (0.0 (m), 0.0 (m)), (2.4 m, 0.0 m), (0.0 m, 2.4 m), and (2.4 m, 2.4 m) are shown in Figure 9. In Figure 9, the circle marks represent the installation position, and the cross marks represent the measurement position. The error is within 20 cm. Therefore, it is considered that distance information can be shared between terminals by handling the distance information with the unit of at least 20 cm.

4.5. Performance Using Two RATs for Communication

Figure 10 shows the characteristics of the mutual information with respect to the shortened information length when the sender and the receiver communicate using two RATs. The square marks indicate the mutual information between the sender and the receiver when one RAT cannot be used for communication due to an attack, and the cross marks indicate the mutual information between the sender and the cyberterrorist when one RAT is wiretapped. When the receiver cannot use one RAT for communication, communication is not possible without shortening. The mutual information of the receiver is slightly increased until the shortened information length is 112, but when the shortened information length is set to 113 bits, the mutual information suddenly becomes one and communication becomes possible. On the other hand, the mutual information of the cyberterrorist continues to decrease with no improvement even if the shortened information length is increased.
Figure 11 shows the characteristics of the secrecy capacity. The square marks, the circle marks and the cross marks indicate the secrecy capacity of the cyberterrorist attacking on two RATs, attacking on one RAT and wiretapping on one RAT, and wiretapping on two RATs, respectively. When the cyberterrorist attacks or wiretaps on two RATs, the secrecy capacity does not improve and is always zero. However, if the cyberterrorist attacks and wiretaps on another RAT simultaneously, the secrecy capacity can be improved by increasing the shortened information length, such that if the shortened information length exceeds 113, the value is 0.7 or greater. As a result, it is confirmed that information-theoretic security is improved even when the sender and the receiver communicate using two RATs.
Therefore, when the designed shortened RA code is used, by setting the shortened information length to 113 bits or more, it is possible to achieve both countermeasures against wiretapping and attacks. To increase the resistance of distance measurement error, the shortened information length may be set large. However, when the shortened information length is increased, the transmission efficiency decreases. Therefore, the shortened information length should be determined by the relationship between the ranging error and the transmission efficiency. The decision algorithm of the shortened information length should be the focus of further study.

4.6. Performance Using Three RATs for Communication

Figure 12 shows the characteristics of the mutual information with respect to the shortened information length when the sender and the receiver communicate using three RATs. The circle marks and the square marks indicate the mutual information between the sender and receiver when two and one RAT(s) cannot be used for communication due to an attack, respectively. The triangle marks and the cross marks indicate the mutual information between the sender and the cyberterrorist when two and one RAT(s) are/is wiretapped, respectively. By communicating using three RATs, even if one RAT is attacked, communication is possible without shortening. In addition, information cannot be wiretapped simply by wiretapping on one RAT. Simultaneous use of multiple RATs is an effective approach to achieve both countermeasures against wiretapping and attacks. When the cyberterrorist attacks two RATs, the mutual information increases slightly up to the shortened information length of about 300 bits, but increases exponentially beyond that, and the mutual information becomes one when the shortened information length is 373 bits or more. On the other hand, when two RATs are wiretapped, the mutual information is one up to the shortened information length of 152 bits, but rapidly decreases as the shortened information length becomes 153 bits or more.
Figure 13 shows the characteristics of the secrecy capacity. The circle marks, the square marks, the triangle marks, and the cross marks indicate the secrecy capacity of the cyberterrorist attacking on three RATs, attacking on two RATs and wiretapping on one RAT, attacking on one RAT and wiretapping on two RATs, and wiretapping on three RATs, respectively. When the cyberterrorist attacks or wiretaps on three RATs, the secrecy capacity does not improve and is zero. If the cyberterrorist attacks on one RAT and wiretaps on two RATs simultaneously, the secrecy capacity increases to approximately 0.6 by increasing the shortened information length. If the cyberterrorist attacks on two RATs and wiretaps on one RAT simultaneously, the secrecy capacity gradually increases by increasing the shortened information length, and when the shortened information length exceeds 373 bits, the secrecy capacity becomes about 0.9. As a result, it is confirmed that information-theoretic security is further improved even when the sender and the receiver communicate using three RATs. Since the degree of freedom of countermeasures increases as the number of RATs used for communication increases, various countermeasures can be implemented depending on the assumed cyberterrorist by changing the shortened information length. However, since it is ineffective if all the RATs are wiretapped or attacked, it is desirable to implement countermeasures at the upper layers as well.

5. Conclusions

This paper proposes a dependable wireless system with shortened code using distance information between integrated terminals. The proposed wireless system has three features to enhance resistance from cyberterrorists. First, integrated terminals with multiple RATs and CODEC communicate encoded information using multiple RATs. Even if some RATs are attacked, the transmitted information can be recovered using encoded information received by other RATs. Even if some RATs are wiretapped, the transmitted information cannot be recovered using less encoded information. Second, the shortened code is adopted as an error correction code. If the receiver knows the shortened information and the cyberterrorist does not know it, it is possible to provide a high correction capability to the receiver and low correction capability to the cyberterrorist. Finally, the distance information between integrated terminals can be measured securely and accurately using UWB. This can improve the capability to protect against wiretapping and attacks in a practical system.
It was confirmed that when two RATs were used for communication, by increasing the shortened information length, the secrecy capacity defined by the maximum transmission rate between the sender and the receiver when the cyberterrorist cannot receive any information could be over 0.7, and that it could be further increased by using three RATs. Although the proposed scheme has a limited capability to protect against wiretapping and attacks, the information-theoretic security capability can be improved. Since the degree of freedom of countermeasures increases as the number of RATs used for communication increases, various countermeasures can be implemented depending on the assumed cyberterrorist by changing the shortened information length.
The following points are mentioned as topics for future work.
  • Though the shortened information length is the parameter which decides the wiretapping resistance and attack resistance, it is necessary to investigate optimization of the shortened information length and quantization technique, because it is also related to error resistance of distance information.
  • It is necessary to examine the effect of the shortened information predicted by the cyberterrorist and the countermeasures and to analyze the performance limit and drawback.
  • The evaluation assumes that RAT communication is completely lost due to the attack, but it is necessary to evaluate the actual attack pattern and the impact of attack resistance on each RAT.
  • It is necessary to analyze performance degradation due to measured distance error or accuracy.
  • It is necessary to examine the application to other codes, because large gain can be obtained by using powerful codes.
  • Evaluation of dependability properties based on heuristic strategies such as “what-if analysis” and “robustness checking” are described in [2].
  • Finally, an evaluation using a real system is necessary.

Author Contributions

Conceptualization, Y.A. and R.K.; methodology, Y.A. and R.K.; software, Y.A.; validation, Y.A. and R.K.; formal analysis, Y.A. and R.K.; investigation, Y.A. and R.K.; resources, Y.A. and R.K.; data curation, Y.A. and R.K.; writing—original draft preparation, Y.A.; writing—review and editing, Y.A. and R.K.; visualization, Y.A.; supervision, R.K.; project administration, R.K.; funding acquisition, R.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Piri, E.; Ruuska, P.; Kanstrén, T.; Mäkelä, J.; Korva, J.; Hekkala, A.; Pouttu, A.; Liina, O.; Latva-aho, M.; Vierimaa, K.; et al. 5GTN: A Test Network for 5G Application Development and Testing. In Proceedings of the European Conference on Networks and Communications (EuCNC), Athens, Greece, 27–30 June 2016. [Google Scholar]
  2. Testa, A.; Cinque, M.; Coronato, A.; Pietro, G.D.; Augusto, J.C. Heuristic strategies for assessing wireless sensor network resiliency: An event-based formal approach. J. Heuristics 2015, 21, 145–175. [Google Scholar] [CrossRef] [Green Version]
  3. Avizienis, A.; Laprie, J.-C.; Randell, B.; Landwehr, C. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secur. Comput. 2004, 1, 11–33. [Google Scholar] [CrossRef] [Green Version]
  4. Jesus, T.C.; Portugal, P.; Vasques, F.; Costa, D.G. Automated methodology for dependability evaluation of wireless visual sensor networks. Sensors 2018, 18, 2629. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Jesus, T.C.; Portugal, P.; Costa, D.G.; Vasques, F. A comprehensive dependability model for QoM-Aware industrial WSN when performing visual area coverage in occluded scenarios. Sensors 2020, 20, 6542. [Google Scholar] [CrossRef]
  6. Diffie, W.; Hellmanuthor, M. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef] [Green Version]
  7. Vandenwauver, M.; Govaerts, R.; Vandewalle, J. Overview of Authentication Protocols. In Proceedings of the IEEE 31st Annual 1997 International Carnahan Conference on Security Technology, Canberra, ACT, Australia, 15–17 October 1997. [Google Scholar]
  8. Goldwasser, J.L. Shortened and punctured codes and the MacWilliams identities. Linear Algebra Appl. 1997, 253, 1–13. [Google Scholar] [CrossRef] [Green Version]
  9. Kreer, J. A question of terminology. IRE Trans. Inf. Theory 1957, 3, 208. [Google Scholar] [CrossRef]
  10. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  11. Perlman, R. An overview of PKI trust models. IEEE Netw. 1999, 13, 38–43. [Google Scholar] [CrossRef]
  12. Pavithran, D.; Shaalan, K. Towards Creating Public Key Authentication for IoT blockchain. In Proceedings of the 2019 Sixth HCT Information Technology Trends (ITT), Ras Al Khaimah, UAE, 20–21 November 2019. [Google Scholar]
  13. Li, Y.; Yu, Y.; Lou, C.; Guizani, N.; Wang, L. Decentralized public key infrastructures atop blockchain. IEEE Netw. 2020, 34, 133–139. [Google Scholar] [CrossRef]
  14. Hershey, J.E.; Hassan, A.A.; Yarlagadda, R. Unconventional cryptographic keying variable management. IEEE Trans. Commun. 1995, 43, 3–6. [Google Scholar] [CrossRef]
  15. Wu, X.; Wang, P.; Wang, K.; Xu, Y. Biometric cryptographic key generation based on city block distance. In Proceedings of the 2009 Workshop on Applications of Computer Vision (WACV), Snowbird, UT, USA, 7–8 December 2009. [Google Scholar]
  16. Yang, T.; Kong, L.; Xin, W.; Hu, J.; Chen, Z. Resisting Relay Attacks on Vehicular Passive Keyless Entry and Start Systems. In Proceedings of the 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery, Chongqing, China, 29–31 May 2012. [Google Scholar]
  17. Yamasaki, S.; Matsushima, T. A security enhancement technique for wireless communications using secret sharing and physical layer secrecy transmission. IEICE Trans. Inf. Syst. 2016, E99-D, 830–838. [Google Scholar] [CrossRef] [Green Version]
  18. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  19. Lin, C.; Harn, L. Unconditionally Secure Multi-Secret Sharing Scheme. In Proceedings of the 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), Zhangjiajie, China, 25–27 May 2012. [Google Scholar]
  20. Gong, X.; Hu, P.; Shum, K.W.; Sung, C.W. A zigzag-decodable ramp secret sharing scheme. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1906–1916. [Google Scholar] [CrossRef]
  21. Eriguchi, R.; Kunihiro, N. Strongly secure ramp secret sharing schemes from any linear secret sharing schemes. In Proceedings of the 2019 IEEE Information Theory Workshop (ITW), Visby, Sweden, 25–28 August 2019. [Google Scholar]
  22. Li, X.; Ratazzi, E.P. MIMO Transmissions with Information-Theoretic Secrecy for Secret-Key Agreement in Wireless Networks. In Proceedings of the MILCOM 2005—2005 IEEE Military Communications Conference, Atlantic City, NJ, USA, 17–20 October 2005. [Google Scholar]
  23. Rao, J.; Vrzic, S. Packet Duplication for URLLC in 5G Dual Connectivity Architecture. In Proceedings of the 2018 IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 15–18 April 2018. [Google Scholar]
  24. Wan, Y.; Wang, Q.; Duan, S.; Zhang, X. RAFH: Reliable Aware Frequency Hopping Method for Industrial Wireless Sensor Networks. In Proceedings of the 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China, 24–26 September 2009. [Google Scholar]
  25. Mohammadmoradi, H.; Heydariaan, M.; Gnawali, O. SRAC: Simultaneous Ranging and Communication in UWB Networks. In Proceedings of the 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), Santorini Island, Greece, 29–31 May 2019. [Google Scholar]
  26. Divsalar, D.; Jin, H.; McEliece, R.J. Coding Theorems for “Turbo-Like” Codes. In Proceedings of the 36th Annual Allerton Conference on Communication Control and Computing, Champaign, IL, USA, 23–25 September 1998. [Google Scholar]
  27. Vázquez-Araújo, F.J.; González-López, M.; Castedo, L.; Frias, J.G. Capacity approaching low-rate LDGM codes. IEEE Trans. Commun. 2011, 59, 352–356. [Google Scholar] [CrossRef]
  28. Gallager, R. Low-density parity-check codes. IRE Trans. Inf. Theory 1962, 8, 21–28. [Google Scholar] [CrossRef] [Green Version]
  29. Jiménez, A.R.; Seco, F. Comparing Decawave and Bespoon UWB Location Systems: Indoor/Outdoor Performance Analysis. In Proceedings of the 2016 International Conference on Indoor Positioning and Indoor Navigation (IPIN), Alcala de Henares, Spain, 4–7 October 2016. [Google Scholar]
  30. Domuta, I.; Palade, T.P.; Puschita, E.; Pastrav, A. Localization in 802. 15.4z Standard. In Proceedings of the 2020 International Workshop on Antenna Technology (iWAT), Bucharest, Romania, 25–28 February 2020. [Google Scholar]
  31. Barros, J.; Rodrigues, M.R.D. Secrecy Capacity of Wireless Channels. In Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, USA, 9–14 July 2006. [Google Scholar]
  32. Leung-Yan-Cheong, S.; Hellman, M. The Gaussian wire-tap channel. IEEE Trans. Inf. Theory 1978, 24, 451–456. [Google Scholar] [CrossRef]
Figure 1. Proposed dependable wireless system. Integrated terminal uses multiple radio access technologies (RATs) such as cellular, ultra-wide band (UWB), Bluetooth, and wireless local area network (LAN) to communicate simultaneously.
Figure 1. Proposed dependable wireless system. Integrated terminal uses multiple radio access technologies (RATs) such as cellular, ultra-wide band (UWB), Bluetooth, and wireless local area network (LAN) to communicate simultaneously.
Telecom 01 00018 g001
Figure 2. Encoding procedure of ( n m , k m ) shortened code.
Figure 2. Encoding procedure of ( n m , k m ) shortened code.
Telecom 01 00018 g002
Figure 3. Structure of systematic repeat-accumulate (RA) code encoder.
Figure 3. Structure of systematic repeat-accumulate (RA) code encoder.
Telecom 01 00018 g003
Figure 4. Parity check matrix of systematic RA code. The column weight q is 3, the row weight r is 3.
Figure 4. Parity check matrix of systematic RA code. The column weight q is 3, the row weight r is 3.
Telecom 01 00018 g004
Figure 5. Operation of double-sided two-way ranging with three messages.
Figure 5. Operation of double-sided two-way ranging with three messages.
Telecom 01 00018 g005
Figure 6. Evaluated simulation model with one sender, one receiver and one cyberterrorist. The sender and the receiver can use up to three RATs for communication.
Figure 6. Evaluated simulation model with one sender, one receiver and one cyberterrorist. The sender and the receiver can use up to three RATs for communication.
Telecom 01 00018 g006
Figure 7. Bit error ratio (BER) characteristics of the receiver whose shortened information is known under the additive white Gaussian noise (AWGN) channel. The shortened information length m using distance information is varied from 0 to 500.
Figure 7. Bit error ratio (BER) characteristics of the receiver whose shortened information is known under the additive white Gaussian noise (AWGN) channel. The shortened information length m using distance information is varied from 0 to 500.
Telecom 01 00018 g007
Figure 8. Bit error ratio (BER) characteristics of the cyberterrorist whose shortened information is unknown under the additive white Gaussian noise (AWGN) channel. The shortened information length m using distance information is varied from 0 to 500.
Figure 8. Bit error ratio (BER) characteristics of the cyberterrorist whose shortened information is unknown under the additive white Gaussian noise (AWGN) channel. The shortened information length m using distance information is varied from 0 to 500.
Telecom 01 00018 g008
Figure 9. Evaluation result of measurement accuracy using Dacawave’s MDEK1001 Development Kit. The circle marks and the cross marks represent the installation position and the measurement position, respectively.
Figure 9. Evaluation result of measurement accuracy using Dacawave’s MDEK1001 Development Kit. The circle marks and the cross marks represent the installation position and the measurement position, respectively.
Telecom 01 00018 g009
Figure 10. Characteristics of the mutual information versus the shortened information length when the sender and the receiver communicate using two RATs. The square marks indicate the mutual information between the sender and the receiver when one RAT cannot be used for communication due to an attack, and the cross marks indicate the mutual information between the sender and the cyberterrorist when one RAT is wiretapped.
Figure 10. Characteristics of the mutual information versus the shortened information length when the sender and the receiver communicate using two RATs. The square marks indicate the mutual information between the sender and the receiver when one RAT cannot be used for communication due to an attack, and the cross marks indicate the mutual information between the sender and the cyberterrorist when one RAT is wiretapped.
Telecom 01 00018 g010
Figure 11. Characteristics of the secrecy capacity versus the shortened information length when the sender and the receiver communicate using two RATs. The square marks, the circle marks and the cross marks indicate the secrecy capacity of the cyberterrorist attacking on two RATs, attacking on one RAT and wiretapping on one RAT, and wiretapping on two RATs, respectively.
Figure 11. Characteristics of the secrecy capacity versus the shortened information length when the sender and the receiver communicate using two RATs. The square marks, the circle marks and the cross marks indicate the secrecy capacity of the cyberterrorist attacking on two RATs, attacking on one RAT and wiretapping on one RAT, and wiretapping on two RATs, respectively.
Telecom 01 00018 g011
Figure 12. Characteristics of the mutual information versus the shortened information length when the sender and the receiver communicate using three RATs. The circle marks and the square marks indicate the mutual information between the sender and receiver when two and one RAT(s) cannot be used for communication due to an attack, respectively. The triangle marks and the cross marks indicate the mutual information between the sender and the cyberterrorist when two and one RAT(s) are/is wiretapped, respectively.
Figure 12. Characteristics of the mutual information versus the shortened information length when the sender and the receiver communicate using three RATs. The circle marks and the square marks indicate the mutual information between the sender and receiver when two and one RAT(s) cannot be used for communication due to an attack, respectively. The triangle marks and the cross marks indicate the mutual information between the sender and the cyberterrorist when two and one RAT(s) are/is wiretapped, respectively.
Telecom 01 00018 g012
Figure 13. Characteristics of the secrecy capacity versus the shortened information length when the sender and the receiver communicate using three RATs. The circle marks, the square marks, the triangle marks, and the cross marks indicate the secrecy capacity of the cyberterrorist attacking on three RATs, attacking on two RATs and wiretapping on one RAT, attacking on one RAT and wiretapping on two RATs, and wiretapping on three RATs, respectively.
Figure 13. Characteristics of the secrecy capacity versus the shortened information length when the sender and the receiver communicate using three RATs. The circle marks, the square marks, the triangle marks, and the cross marks indicate the secrecy capacity of the cyberterrorist attacking on three RATs, attacking on two RATs and wiretapping on one RAT, attacking on one RAT and wiretapping on two RATs, and wiretapping on three RATs, respectively.
Telecom 01 00018 g013
Table 1. Definitions of terms and symbols.
Table 1. Definitions of terms and symbols.
Term/SymbolDefinition
Shortened informationInformation to be removed after encoding
Unencoded bitsBit sequence containing the shortened information and information
Column weightNumber of 1’s in column of information bits of the parity check matrix
Row weightNumber of 1’s in row of information bits of the parity check matrix
k Unencoded bit length
n Codeword length
m Shortened information length
t Number of bits that can be decoded by decoder of ( n , k ) code
s Number of bits that can be decoded by decoder of ( n m , k m ) shortened code without the shortened information
E Efficiency of ( n , k ) code
E y Efficiency of ( n m , k m ) shortened code
when decoder uses the shortened information
E z Efficiency of ( n m , k m ) shortened code
when decoder does not use the shortened information
q Column weight
r Row weight
Table 2. Definitions of terms and symbols.
Table 2. Definitions of terms and symbols.
Term/SymbolDefinition
SenderTerminal sending information to the receiver
ReceiverTerminal receiving information from the sender
CyberterroristTerminal that can be wiretapped and attacked simultaneously
C y Channel capacity of the receiver under attack
C z Channel capacity due to wiretapping by the cyberterrorist
C Secrecy capacity
X Random sequence sent by the sender
X = { x 1 = 0 ,   x 2 = 1 }
Y Received sequence by the receiver under attack
Y = { y 1 = 0 ,   y 2 = 1 }
Z Wiretapped sequence by the cyberterrorist
Z = { z 1 = 0 ,   z 2 = 1 }
D Errors not corrected by decoder
H ( X ) Entropy of X
H ( Y ) Entropy of Y
H ( Z ) Entropy of Z
P ( x i ) Probability of x i
P ( y i ) Probability of y i
P ( z i ) Probability of z i
I ( X ; Y ) Mutual information between X and Y
I ( X ; Z ) Mutual information between X and Z
P e y Probability of different bits of X and Y
P e z Probability of different bits of X and Z
Table 3. Parameters of shortened RA code.
Table 3. Parameters of shortened RA code.
ParameterDetail
Unencoded bit length ( k )600
Codeword length ( n )1200
Shortened information length ( m )0~500
Column weight ( q )3
Decoding algorithmLogMAP
Maximum number of repetitions100
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Amezawa, Y.; Kohno, R. Dependable Wireless System with Shortened Code Using Distance Information between Integrated Terminals. Telecom 2020, 1, 266-282. https://0-doi-org.brum.beds.ac.uk/10.3390/telecom1030018

AMA Style

Amezawa Y, Kohno R. Dependable Wireless System with Shortened Code Using Distance Information between Integrated Terminals. Telecom. 2020; 1(3):266-282. https://0-doi-org.brum.beds.ac.uk/10.3390/telecom1030018

Chicago/Turabian Style

Amezawa, Yasuharu, and Ryuji Kohno. 2020. "Dependable Wireless System with Shortened Code Using Distance Information between Integrated Terminals" Telecom 1, no. 3: 266-282. https://0-doi-org.brum.beds.ac.uk/10.3390/telecom1030018

Article Metrics

Back to TopTop