Abstract

If Beyond-5G(B5G)/6G is to support critical infrastructure worldwide, there must be an effort to jointly integrate low latency and privacy into wireless protocols. This research analyzes new schemes for securing applications at low latency by extending Physical Layer Security (PLS) algorithms to B5G/6G systems. We design protocols that advance a specific form of Physical Layer Security, known as Key-based Physical Layer Security, from the theoretical realm into the practical. One form of a Key-based algorithm obscures information from eavesdroppers by mapping it to cleverly rotated reference signals. For such a scheme, prior work has found that the two-way exchange of completely private information involves six OFDM symbol times, not including synchronization. By developing a protocol that makes the most optimum use of time-frequency resources, we show that it is possible to achieve two-way private exchange and synchronization in only four symbol times - the least latency possible. A significant simulation result indicates that our improved protocol achieves sub-1 ms two-way latency, including re-transmissions. We also illustrate a protocol that shows how Key-based Physical Layer Security can privatize critical PHY layer functions such as cell search. Lastly, additional results show the performance of the PLS algorithm in terms of Key Bit Error Rates and secret key transmission rates.

Highlights

  • S ECURITY and latency are crucial elements in B5G/6G network design

  • Motivated by the need to achieve privacy at low latency, we propose using a technology known as Physical Layer Security (PLS)

  • OUR CONTRIBUTIONS This paper proposes a new use case for B5G/6G networks known as Ultra Secure Low Latency Communications

Read more

Summary

INTRODUCTION

S ECURITY and latency are crucial elements in B5G/6G network design Several applications such as autonomous vehicles and telemedicine involve exchanging sensitive command, control, and feedback information. A. OUR CONTRIBUTIONS This paper proposes a new use case for B5G/6G networks known as Ultra Secure Low Latency Communications. We make the first attempt to move privacy algorithms into the practical realm by connecting them with modern cellular implementations We do this by describing the integration of physical layer security into the 5G functional splits (Section IV-A and Fig. 3). It is imperative to protect the privacy of the Cell ID To this end, we propose to use Physical Layer Security for the private transmission of the Cell ID between the base station and the UE (Section IV-C and Fig. 6). We draw comparisons with prior work [5]

BACKGROUND
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call