Staff View
Novel enabling components for physical layer security powered by deep learning algorithms and metamaterial antennas

Descriptive

TitleInfo
Title
Novel enabling components for physical layer security powered by deep learning algorithms and metamaterial antennas
Name (type = personal)
NamePart (type = family)
Nooraiepour
NamePart (type = given)
Alireza
DisplayForm
Alireza Nooraiepour
Role
RoleTerm (authority = RULIB)
author
Name (type = personal)
NamePart (type = family)
Mandayam
NamePart (type = given)
Narayan B.
Affiliation
Advisory Committee
DisplayForm
Narayan B. Mandayam
Role
RoleTerm (authority = RULIB)
chair
Name (type = personal)
NamePart (type = family)
Bajwa
NamePart (type = given)
Waheed
DisplayForm
Waheed Bajwa
Affiliation
Advisory Committee
Role
RoleTerm (authority = RULIB)
chair
Name (type = personal)
NamePart (type = family)
Wu
NamePart (type = given)
Chung-Tse
DisplayForm
Chung-Tse Wu
Affiliation
Advisory Committee
Role
RoleTerm (authority = local)
member
Name (type = personal)
NamePart (type = family)
Ghasempour
NamePart (type = given)
Yasaman
DisplayForm
Yasaman Ghasempour
Affiliation
Advisory Committee
Role
RoleTerm (authority = local)
member
Name (type = corporate)
NamePart
Rutgers University
Role
RoleTerm (authority = RULIB)
degree grantor
Name (type = corporate)
NamePart
School of Graduate Studies
Role
RoleTerm (authority = RULIB)
school
TypeOfResource
Text
Genre (authority = marcgt)
theses
OriginInfo
DateCreated (encoding = w3cdtf); (keyDate = yes); (qualifier = exact)
2023
DateOther (encoding = w3cdtf); (qualifier = exact); (type = degree)
2023-01
Language
LanguageTerm (authority = ISO 639-3:2007); (type = text)
English
Abstract (type = abstract)
The last few years have witnessed the release of a dizzying array of “smart and connected” devices by technology companies that seems to suggest that the internet-of-things (IoT)-driven revolution is just around the corner. One important challenge to tackle in this realm is providing efficient scalable security solutions for such devices. Physical layer (PHY) security has been put forth as an alternative to traditional higher-layer security approaches like cryptography methods that work based on the burdensome tasks of distribution and management of secret keys. In this work, we tackle the problem of securing wireless systems from the physical layer by fending off passive/active attacks. To this end, we devise novel secure methods and hardware prototypes where the former is powered by the state-of-the-art learning/statistical algorithms while the latter is built upon metamaterial antennas. The first part of our work revolves around physical layer spoofing attacks, where an adversary's goal is to impersonate a legitimate transmitter in the eyes of a legitimate receiver. These attacks which aim at injecting spurious data into the receiver, involve inferring transmission parameters and finding PHY characteristics of the transmitted signals so as to spoof the received signal. We focus on the non-contiguous (NC) orthogonal frequency division multiplexing (OFDM) systems that have been argued to have low probability of exploitation (LPE) characteristics against classic attacks based on cyclostationary analysis, and the corresponding PHY has been deemed to be secure. However, with the advent of machine learning (ML) algorithms, adversaries can devise data-driven attacks to compromise such systems. It is in this vein that PHY spoofing performance of the adversaries equipped with supervised and unsupervised ML tools is investigated in the first part. The supervised ML approach is based on estimation/classification utilizing deep neural networks (DNN) while the unsupervised one employs variational autoencoders (VAEs). Simulation results demonstrate that the performance of the spoofing adversaries highly depends on the subcarriers' allocation patterns used at the transmitter. In particular, it is shown that utilizing a random subcarrier occupancy pattern precludes the adversary from spoofing and secures NC-OFDM systems against ML-based attacks. In the second part, we propose novel transmission schemes, enabled by recent advances in the fields of metamaterial (MTM), leaky-wave antenna (LWA). MTM-LWAs, which offer compact, integrated, and cost-effective alternatives to the classic phased-array architectures, are particularly of interest for emerging wireless communication systems including IoT. The proposed secure schemes are devised to accomplish the functionalities of directional modulation (DM) to enhance physical layer security for OFDM and NC-OFDM transmissions, while enjoying the implementation benefits of MTM-LWAs. Specifically, transmitter architectures based on the idea of time-modulated MTM-LWA have been put forth as a promising solution for PHY security for the first time. To further reduce the implementation cost for achieving DM, we propose a space-time-modulated digitally-coded MTM-LWA that can enable PHY security. From the theoretical perspective, we first show how the proposed space-time MTM antenna architecture can achieve DM through both the spatial and spectral manipulation of the orthogonal frequency division multiplexing (OFDM) signal received by a user equipment (UE). Simulation results are then provided as proof-of-principle, demonstrating the applicability of our approach for achieving DM in various communication settings. To further validate our simulation results, we realize a prototype of the proposed architecture controlled by a field-programmable gate array (FPGA), which achieves DM via an optimized coding sequence carried out by the branch-and-bound algorithm corresponding to the states of the MTM LWA's unit cells. Experimental results confirm the theory behind the space-time-modulated MTM LWA in achieving DM, which is observed via both the spectral harmonic patterns and bit error rate (BER) measurements.
Finally, we investigate how the paucity of available training data affects the learning-based physical layer security solutions. We consider the fundamental task of classification, which has numerous applications for PHY security including spoofing detection, given a limited number of training data samples. We propose a hybrid classification framework---termed HyPhyLearn---is proposed that fuses the strength of both the physics-based statistical models and the learning-based classifiers to achieve superior classification performance. The proposed hybrid approach first estimates the unobservable model parameters using the available (suboptimal) statistical estimation procedures, and subsequently use the physics-based statistical models to generate synthetic data. Then, the training data samples are incorporated with the synthetic data in a learning-based classifier that is based on domain-adversarial training of neural networks. Numerical results demonstrate that the proposed approach leads to major classification improvements in comparison to the existing standalone or hybrid classification methods.
Subject (authority = RUETD)
Topic
Engineering
Subject (authority = LCSH)
Topic
Computer security
Subject (authority = local)
Topic
Physical layer security
RelatedItem (type = host)
TitleInfo
Title
Rutgers University Electronic Theses and Dissertations
Identifier (type = RULIB)
ETD
RelatedItem (type = host)
TitleInfo
Title
School of Graduate Studies Electronic Theses and Dissertations
Identifier (type = local)
rucore10001600001
Identifier
http://dissertations.umi.com/gsnb.rutgers:12344
Identifier (type = doi)
doi:10.7282/t3-kjjp-4695
PhysicalDescription
InternetMediaType
application/pdf
InternetMediaType
text/xml
Extent
185 pages : illustrations
Note (type = degree)
Ph.D.
Note (type = bibliography)
Includes bibliographical references
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
NjNbRU
Back to the top

Rights

RightsDeclaration (ID = rulibRdec0006)
The author owns the copyright to this work.
RightsHolder (type = personal)
Name
FamilyName
Nooraiepour
GivenName
Alireza
Role
Copyright holder
RightsEvent
Type
Permission or license
DateTime (encoding = w3cdtf); (qualifier = exact); (point = start)
2023-02-23T13:54:07
AssociatedEntity
Name
Alireza Nooraiepour
Role
Copyright holder
Affiliation
Rutgers University. School of Graduate Studies
AssociatedObject
Type
License
Name
Author Agreement License
Detail
I hereby grant to the Rutgers University Libraries and to my school the non-exclusive right to archive, reproduce and distribute my thesis or dissertation, in whole or in part, and/or my abstract, in whole or in part, in and from an electronic format, subject to the release date subsequently stipulated in this submittal form and approved by my school. I represent and stipulate that the thesis or dissertation and its abstract are my original work, that they do not infringe or violate any rights of others, and that I make these grants as the sole owner of the rights to my thesis or dissertation and its abstract. I represent that I have obtained written permissions, when necessary, from the owner(s) of each third party copyrighted matter to be included in my thesis or dissertation and will supply copies of such upon request by my school. I acknowledge that RU ETD and my school will not distribute my thesis or dissertation or its abstract if, in their reasonable judgment, they believe all such rights have not been secured. I acknowledge that I retain ownership rights to the copyright of my work. I also retain the right to use all or part of this thesis or dissertation in future works, such as articles or books.
Copyright
Status
Copyright protected
Availability
Status
Open
Reason
Permission or license
Back to the top

Technical

RULTechMD (ID = TECHNICAL1)
ContentModel
ETD
OperatingSystem (VERSION = 5.1)
windows xp
CreatingApplication
Version
1.6
DateCreated (point = end); (encoding = w3cdtf); (qualifier = exact)
2023-01-05T15:38:09
DateCreated (point = end); (encoding = w3cdtf); (qualifier = exact)
2023-01-10T13:14:34
ApplicationName
pdfTeX-1.40.24
Back to the top
Version 8.5.3
Rutgers University Libraries - Copyright ©2023