scholarly journals Experimental Phantom-Based Security Analysis for Next-Generation Leadless Cardiac Pacemakers

Sensors ◽  
2018 ◽  
Vol 18 (12) ◽  
pp. 4327 ◽  
Author(s):  
Muhammad Awan ◽  
Sofia Perez-Simbor ◽  
Concepcion Garcia-Pardo ◽  
Kimmo Kansanen ◽  
Narcis Cardona

With technological advancement, implanted medical devices can treat a wide range of chronic diseases such as cardiac arrhythmia, deafness, diabetes, etc. Cardiac pacemakers are used to maintain normal heart rhythms. The next generation of these pacemakers is expected to be completely wireless, providing new security threats. Thus, it is critical to secure pacemaker transmissions between legitimate nodes from a third party or an eavesdropper. This work estimates the eavesdropping risk and explores the potential of securing transmissions between leadless capsules inside the heart and the subcutaneous implant under the skin against external eavesdroppers by using physical-layer security methods. In this work, we perform phantom experiments to replicate the dielectric properties of the human heart, blood, and fat for channel modeling between in-body-to-in-body devices and from in-body-to-off-body scenario. These scenarios reflect the channel between legitimate nodes and that between a legitimate node and an eavesdropper. In our case, a legitimate node is a leadless cardiac pacemaker implanted in the right ventricle of a human heart transmitting to a legitimate receiver, which is a subcutaneous implant beneath the collar bone under the skin. In addition, a third party outside the body is trying to eavesdrop the communication. The measurements are performed for ultrawide band (UWB) and industrial, scientific, and medical (ISM) frequency bands. By using these channel models, we analyzed the risk of using the concept of outage probability and determine the eavesdropping range in the case of using UWB and ISM frequency bands. Furthermore, the probability of positive secrecy capacity is also determined, along with outage probability of a secrecy rate, which are the fundamental parameters in depicting the physical-layer security methods. Here, we show that path loss follows a log-normal distribution. In addition, for the ISM frequency band, the probability of successful eavesdropping for a data rate of 600 kbps (Electromyogram (EMG)) is about 97.68% at an eavesdropper distance of 1.3 m and approaches 28.13% at an eavesdropper distance of 4.2 m, whereas for UWB frequency band the eavesdropping risk approaches 0.2847% at an eavesdropper distance of 0.22 m. Furthermore, the probability of positive secrecy capacity is about 44.88% at eavesdropper distance of 0.12 m and approaches approximately 97% at an eavesdropper distance of 0.4 m for ISM frequency band, whereas for UWB, the same statistics are 96.84% at 0.12 m and 100% at 0.4 m. Moreover, the outage probability of secrecy capacity is also determined by using a fixed secrecy rate.

2021 ◽  
Vol 17 (12) ◽  
pp. 155014772110590
Author(s):  
Zhihui Shang ◽  
Tao Zhang ◽  
Liwei Tao ◽  
Zhongwu Xiang ◽  
Weiwei Yang

This article studies the physical layer security in a downlink full-duplex cognitive non-orthogonal multiple access sensor networks (FD-C-NOMA). Compared with the existing works, this article proposes a FD-C-NOMA transmission scheme with a primary user (PU) and secondary user (SU) sensor nodes in the presence of an eavesdropper. The zero-forcing beamforming design problems of FD operation are investigated subject to the practical secrecy rate and the quality of services of PU. To characterize the security reliability trade-off of the FD-C-NOMA scheme, we first derive the closed-form expressions of connection outage probability (COP), the secrecy outage probability (SOP), and effective secrecy throughput (EST) of each SU in the NOMA networks. Then the impacts of the system parameters on the COP, SOP, and EST are investigated to evaluate the security and reliability in the FD-C-NOMA networks. Furthermore, in order to further verify the security and reliability of our considered network, an OMA scheme of FD operation is provided in the simulation for the purpose of comparison. Results demonstrate that the NOMA-based cognitive sensor networks of FD operation outperforms the OMA system in terms of EST. Finally, simulations are performed to validate the accuracy of our analysis results of the proposed scheme.


2021 ◽  
Vol 13 (8) ◽  
pp. 205
Author(s):  
Deemah Tashman ◽  
Walaa Hamouda

In this paper, the physical-layer security for a three-node wiretap system model is studied. Under the threat of multiple eavesdroppers, it is presumed that a transmitter is communicating with a legitimate receiver. The channels are assumed to be following cascaded κ-μ fading distributions. In addition, two scenarios for eavesdroppers’ interception and information-processing capabilities are investigated: colluding and non-colluding eavesdroppers. The positions of these eavesdroppers are assumed to be random in the non-colluding eavesdropping scenario, based on a homogeneous Poisson point process (HPPP). The security is examined in terms of the secrecy outage probability, the probability of non-zero secrecy capacity, and the intercept probability. The exact and asymptotic expressions for the secrecy outage probability and the probability of non-zero secrecy capacity are derived. The results demonstrate the effect of the cascade level on security. Additionally, the results indicate that as the number of eavesdroppers rises, the privacy of signals exchanged between legitimate ends deteriorates. Furthermore, in this paper, regarding the capabilities of tapping and processing the information, we provide a comparison between colluding and non-colluding eavesdropping.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 5
Author(s):  
Pengfei Hou ◽  
Jianping Gong ◽  
Jumin Zhao

In this paper, we proposed a scheme that Injects artificial noise from the tag end (IANT) to enhance the physical layer security of the ambient backscatter communication (ABC) system. The difference between the ABC system and the traditional radio frequency identification system is whether it uses the radio frequency (RF) signals in the environment to supply energy and modulation information for passive tags. In the IANT scheme, we select the best tag to communicate with the reader according to the channel quality between tags and reader, and at the same time select another tag to generate artificial noise that affects the receiving effect of the eavesdropper. This paper uses the method of generating noise copies in the reader to reduce the interference of artificial noise on the signal received by the reader. The simulation results show that with the increase in channel quality between tags and reader and the increase in the number of tags, the proposed IANT scheme is significantly superior to the contrast scheme in terms of system achievable secrecy rate, effectively enhancing the physical layer security of the ABC system.


Sensors ◽  
2019 ◽  
Vol 19 (24) ◽  
pp. 5396
Author(s):  
Wei Zhang ◽  
Bin Li ◽  
Mingnan Le ◽  
Jun Wang ◽  
Jinye Peng

Directional modulation (DM), as an emerging promising physical layer security (PLS) technique at the transmitter side with the help of an antenna array, has developed rapidly over decades. In this study, a DM technique using a polarization sensitive array (PSA) to produce the modulation with different polarization states (PSs) at different directions is investigated. A PSA, as a vector sensor, can be employed for more effective DM for an additional degree of freedom (DOF) provided in the polarization domain. The polarization information can be exploited to transmit different data streams simultaneously at the same directions, same frequency, but with different PSs in the desired directions to increase the channel capacity, and with random PSs off the desired directions to enhance PLS. The proposed method has the capability of concurrently projecting independent signals into different specified spatial directions while simultaneously distorting signal constellation in all other directions. The symbol error rate (SER), secrecy rate, and the robustness of the proposed DM scheme are analyzed. Design examples for single- and multi-beam DM systems are also presented. Simulations corroborate that (1) the proposed method is more effective for PLS; (2) the proposed DM scheme is more power-efficient than the traditional artificial noise aided DM schemes; and (3) the channel capacity is significantly improved compared with conventional scalar antenna arrays.


Sign in / Sign up

Export Citation Format

Share Document