Physical layer security and privacy (PLS)

Physical layer security and privacy.
Distributed jamming of Massive MIMO

Physical Layer Security (PLS) is a security approach that operates directly on wireless signals, leveraging the unique characteristics of the propagation channel and hardware as sources of entropy to ensure confidentiality, integrity, and authentication in communications.

Unlike traditional security approaches that operate at higher layers (such as encryption in the network or application layers), these techniques often feature lightweight implementations, making them well-suited for resource-constrained scenarios. Common attacks and vulnerabilities addressed in physical layer security include:

  • Eavesdropping: By taking advantage of the broadcast nature of wireless communications, an unauthorized party intercepts the transmitted signal in an attempt to decode confidential information.
  • Jamming: An adversary deliberately introducing noise or interference into the communication channel to degrade or disrupt the communication. Some recent works:
    GNSS and Massive MIMO: Spoofing, Jamming and Robust Receiver Design for Impulsive Noise
  • Spoofing: The attacker pretends to be a legitimate sender or receiver by falsifying signal characteristics, which can lead to unauthorized access or manipulation of the communication.
  • Relay Attacks (Man-in-the-Middle): An adversary intercepts a signal between two communicating devices and relays it, often amplifying or manipulating it, without detection.
  • Pilot spoofing attack: Adversaries inject malicious signals during the channel estimation phase, corrupting the estimation and leading to degraded communication quality or security vulnerabilities.
  • Channel Manipulation Attacks: Attackers attempt to manipulate the wireless channel by introducing obstacles, reflectors, or other environmental changes to alter the characteristics of the signal propagation.
  • Privacy attacks: At the physical layer, these attacks focus on the physical properties of wireless signals or device behaviour to infer sensitive information or locate and track users. Some recent papers:
    Over-the-Air Federated Learning with Privacy Protection via Correlated Additive Perturbations
    Privacy-Preserving Framework for Cell-Free MIMO ISAC Systems
  • Attacks in over-the-air computation: Active attackers send random or misleading data to alter the aggregated data received by the server in Over-the-Air (OtA) computation. OtA computation is a newly emerged concept for computing functions of data from distributed nodes by taking advantage of the wave superposition property of wireless channels. Some recent papers:
    Detecting Active Attacks in Over-the-Air Computation using Dummy Samples

We are interested at discovering new vulnerabilities and new opportunities for physical layer security in wireless communication systems by exploiting emerging technologies, such as co-located and distributed massive MIMO, integrated sensing and communication, over-the-air federated learning, and sub-THz transmissions.

Projects:

We contribute to the Cost Action 6G-PHYSEC in topics related to Trustworthiness for 6G and physical layer security. We lead working group 1.

Researchers

About the division

About the department