Sensors | 卷:21 |
Securing the Insecure: A First-Line-of-Defense for Body-Centric Nanoscale Communication Systems Operating in THz Band | |
HasanT. Abbas1  QammerH. Abbasi1  MuhammadA. Imran1  MuhammadArslan Khalid2  MuhammadMahboob Ur Rahman3  Waqas Aman3  Akram Alomainy4  | |
[1] Department of Electronics and Nano Engineering, University of Glasgow, Glasgow G12 8QQ, UK; | |
[2] Division of Biomedical Engineering, School of Engineering, University of Glasgow, Glasgow G12 8QQ, UK; | |
[3] Electrical Engineering Department, Information Technology University, Lahore 54000, Pakistan; | |
[4] School of Electronic Engineering and Computer Science, Queen Mary University of London, London E1 4NS, UK; | |
关键词: body-centric sensor networks; nanoscale communication; terahertz communication; nano sensors; security; authentication; | |
DOI : 10.3390/s21103534 | |
来源: DOAJ |
【 摘 要 】
This manuscript presents a novel mechanism (at the physical layer) for authentication and transmitter identification in a body-centric nanoscale communication system operating in the terahertz (THz) band. The unique characteristics of the propagation medium in the THz band renders the existing techniques (say for impersonation detection in cellular networks) not applicable. In this work, we considered a body-centric network with multiple on-body nano-senor nodes (of which some nano-sensors have been compromised) who communicate their sensed data to a nearby gateway node. We proposed to protect the transmissions on the link between the legitimate nano-sensor nodes and the gateway by exploiting the path loss of the THz propagation medium as the fingerprint/feature of the sender node to carry out authentication at the gateway. Specifically, we proposed a two-step hypothesis testing mechanism at the gateway to counter the impersonation (false data injection) attacks by malicious nano-sensors. To this end, we computed the path loss of the THz link under consideration using the high-resolution transmission molecular absorption (HITRAN) database. Furthermore, to refine the outcome of the two-step hypothesis testing device, we modeled the impersonation attack detection problem as a hidden Markov model (HMM), which was then solved by the classical Viterbi algorithm. As a bye-product of the authentication problem, we performed transmitter identification (when the two-step hypothesis testing device decides no impersonation) using (i) the maximum likelihood (ML) method and (ii) the Gaussian mixture model (GMM), whose parameters are learned via the expectation–maximization algorithm. Our simulation results showed that the two error probabilities (missed detection and false alarm) were decreasing functions of the signal-to-noise ratio (SNR). Specifically, at an SNR of 10 dB with a pre-specified false alarm rate of
【 授权许可】
Unknown