[en] In this work, we consider an eavesdropping scenario in wireless multi-user (MU) multiple-input single-output (MISO) systems with channel coding in the presence of a multi-antenna eavesdropper (Eve). In this setting, we exploit machine learning (ML) tools to design a hard decoding scheme by using precoded pilot symbols as training data. Within this, we propose an ML framework for a multi-antenna hard decoder that allows an Eve to decode the transmitted message with decent accuracy. We show that MU-MISO systems are vulnerable to such an attack when conventional block-level precoding is used. To counteract this attack, we propose a novel symbol-level precoding scheme that increases the bit-error rate at Eve by obstructing the learning process. Simulation results validate both the ML-based attack as well as the countermeasure, and show that the gain in security is achieved without affecting the performance at the intended users.
Disciplines :
Electrical & electronics engineering
Author, co-author :
Mayouche, Abderrahmane ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Alves Martins, Wallace ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Tsinos, Christos G.
Chatzinotas, Symeon ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
Ottersten, Björn ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
yes
Language :
English
Title :
A Novel Learning-based Hard Decoding Scheme and Symbol-Level Precoding Countermeasures
Publication date :
2021
Event name :
IEEE Wireless Communications and Networking Conference (WCNC)
Event date :
From 29-03-2021 to 01-04-2021
By request :
Yes
Audience :
International
Main work title :
IEEE Wireless Communications and Networking Conference (WCNC), Najing 29 March to 01 April 2021
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
FnR Project :
FNR11607830 - Exploiting Interference For Physical Layer Security In 5g Networks, 2017 (01/02/2018-31/07/2021) - Bjorn Ottersten
W. Saad, M. Bennis, and M. Chen, “A vision of 6G wireless systems: Applications, trends, technologies, and open research problems,” IEEE Netw., vol. 34, no. 3, pp. 134–142, May/June 2019.
P. Yang, Y. Xiao, M. Xiao, and S. Li, “6G wireless communications: Vision and potential techniques,” IEEE Netw., vol. 33, no. 4, pp. 70–75, July/Aug 2019.
G. Gui, M. Liu, F. Tang, N. Kato, and F. Adachi, “6G: Opening new horizons for integration of comfort, security and intelligence,” IEEE Wireless Commun., pp. 1–7, 2020.
Cisco VNI Forecast, “Cisco Visual Networking Index: Forecast and Trends, 2018-2023 White Paper,” Cisco Public Inf., Feb 2019.
Y. Liu, H. Chen, and L. Wang, “Physical layer security for next generation wireless networks: Theories, technologies, and challenges,” IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 347–376, 2017.
Y. Wu, A. Khisti, C. Xiao, G. Caire, K. Wong, and X. Gao, “A survey of physical layer security techniques for 5G wireless networks and challenges ahead,” IEEE J. Sel. Areas in Commun., vol. 36, no. 4, pp. 679–695, Apr. 2018.
A. Li, D. Spano, J. Krivochiza, S. Domouchtsidis, C. G. Tsinos, C. Masouros, S. Chatzinotas, Y. Li, B. Vucetic, and B. Ottersten, “A tutorial on interference exploitation via symbol-level precoding: Overview, state-of-the-art and future directions,” IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 796–839, Secondquarter 2020.
M. Alodeh, D. Spano, A. Kalantari, C. G. Tsinos, D. Christopoulos, S. Chatzinotas, and B. Ottersten, “Symbol-level and multicast precoding for multiuser multiantenna downlink: A state-of-the-art, classification, and challenges,” IEEE Commun. Surveys Tuts., vol. 20, no. 3, pp. 1733–1757, thirdquarter 2018.
C. Masouros and E. Alsusa, “Dynamic linear precoding for the exploitation of known interference in MIMO broadcast systems,” IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1396–1404, Mar. 2009.
A. Kalantari, M. Soltanalian, S. Maleki, S. Chatzinotas, and B. Ottersten, “Directional modulation via symbol-level precoding: A way to enhance security,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp. 1478–1493, Dec. 2016.
Taesang Yoo and A. Goldsmith, “On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming,” IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp. 528–541, 2006.
J. Wang, C. Jiang, H. Zhang, Y. Ren, K. C. Chen, and L. Hanzo, “Thirty years of machine learning: The road to Pareto-Optimal wireless networks,” IEEE Commun. Surveys Tuts., vol. 22, no. 3, pp. 1472–1514, 2020.
M. Z. Hameed, A. Gyorgy, and D. Gunduz, “Communication without interception: Defense against deep-learning-based modulation detection,” vol. arXiv preprint arXiv:1902.10674, 2019. [Online]. Available: http://arxiv.org/abs/1902.10674
K. L. Besser, P.-H. Lin, C. R. Janda, and E. A. Jorswieck, “Wiretap code design by neural network autoencoders,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3374–3386, 2019.
R. Fritschek, R. F. Schaefer, and G. Wunder, “Deep learning for the gaussian wiretap channel,” vol. arXiv preprint arXiv:1810.12655, 2018. [Online]. Available: http://arxiv.org/abs/1810.12655
A. Mayouche, D. Spano, C. G. Tsinos, S. Chatzinotas, and B. Ottersten, “Learning-assisted eavesdropping and symbol-level precoding countermeasures for downlink MU-MISO systems,” IEEE Open J. Comm. Soc., vol. 1, pp. 535–549, 2020.
ETSI, “Digital Video Broadcasting (DVB); Second generation framing structure, channel coding and modulation systems for Broadcasting, Interactive Services, News Gathering and other broadband satellite applications; Part 2: DVB-S2 Extensions (DVB-S2X),” European Telecommunications Standards Institute (ETSI), Deliverable 302.307-2, 10 2014, version 1.1.1.
A. Mayouche, D. Spano, C. G. Tsinos, S. Chatzinotas, and B. Ottersten, “SER-constrained symbol-level precoding for physical-layer security,” IEEE Conf. Commun. Netw. Security, pp. 1–5, June 2019.
M. R. A. Khandaker, C. Masouros, and K. Wong, “Constructive interference based secure precoding: A new dimension in physical layer security,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 9, pp. 2256–2268, Sept. 2018.
D. Spano, M. Alodeh, S. Chatzinotas, and B. Ottersten, “Symbol-level precoding for the nonlinear multiuser MISO downlink channel,” IEEE Trans. Signal Process., vol. 66, no. 5, pp. 1331–1345, Mar. 2018.
S. Boyd and L. Vandenberghe, Convex optimization. Cambridge Univ. Press, 2004.
J. Yuan, A practical guide to error-control coding using MATLAB. Boston: Artech House, 2010.
A. J. Viterbi, “A personal history of the Viterbi algorithm,” IEEE Signal Process. Magazine, vol. 23, no. 4, pp. 120–142, July 2006.
P. Popovski, K. F. Trillingsgaard, O. Simeone, and G. Durisi, “5g wireless network slicing for eMBB, URLLC, and mMTC: A communication-theoretic view,” IEEE Access, vol. 6, pp. 55 765–55 779, 2018.