Home // SnT // Research // SIGCOM // Projects // CI-PHY: Exploiting interference for physical layer security in 5G networks

CI-PHY: Exploiting interference for physical layer security in 5G networks

Funding Source: EPSRC-FNR
Partners: University of Luxembourg (UL), University College London (UCL)
Principal Investigators: Prof. Bjorn Ottersten (UL), Dr. Christos Masouros (UCL)
Project Start Date: 01/02/2018
Project End Date: 31/01/2021

Security and privacy have become a paramount concern in modern ICT, as threats from cybercrime are soaring. This year's global economic crime survey conducted by PwC reported that cybercrime has jumped from 4th to 2nd place among the most-reported types of economic crime. The severity of threat on the business, financial, infrastructure and other UK sectors makes all facets of security and risk management pertinent, and their importance cannot be overstated. Physical layer security (PS) provides an extra layer of security on top of the traditional cryptographic measures. It obstructs access to the wireless traffic itself, thus averting any higher layer attack. Encompassing a number of key technologies spanning secure beamforming, artificial noise design, network coding, cooperative jamming, graph theory, and directional modulation, PS is now commonly accepted as one of the most effective forms of security. While appealing as a theoretical concept, PS still faces a number of critical challenges that prevent it from wide commercial adoption in 5G and beyond, involving the lack of secure 5G signaling, the provision of eavesdroppers' information, and the applicability of existing theoretical techniques in real environments and under low-specification hardware.

CI-PHY addresses the abovementioned challenges, and promotes a paradigm shift on security by exploiting interference.

In particular, CI-PHY exploits constructive interference for Physical Layer Security by:

  1. Specifically tailored fundamental waveform design to exploit interference that provides a low complexity solution with limited hardware requirements.
  2. Artificial noise and jamming to actively improve the desired receivers' SNR under secrecy constraints, and further improve secrecy by designing the artificial noise to align destructively to the signal at the eavesdropper.
  3. Robust approaches for real implementation by taking hardware impairments into account to reduce the hardware requirements for providing secrecy with resource-constrained devices.
  4. Real implementation and over-the-air testing of security solutions to evaluate and optimize performance in commercially relevant environments.

Figure : Transceiver Architecture

UL Team

UCL Team


Relevant Links: