PHYSICAL LAYER COMMUNICATION SECURITY IN 5G/6G NETWORKS OF INTELLIGENT TRANSPORT SYSTEMS BASED ON PROBABILISTIC CRYPTOGRAPHIC TRANSFORMATIONS
DOI:
https://doi.org/10.20535/2411-2976.22025.48-54Keywords:
IoT, IoT information security, ultra-reliable low-latency communication, intelligent transportation system, connected vehicles, autonomous vehicle security, physical layer protection, tapped channel concept, wire-tap channelAbstract
Background. Ultra-Reliable Low Latency Communication (URLLC) as a service offered by fifth and sixth generation (5G/6G) wireless systems is a technological response to the needs of various mission-critical applications that require reliable data transmission with low latency. These applications also include Intelligent Transportation Systems services, which, among other things, provide connectivity and autonomous vehicle control. The combination of high reliability and low latency requirements in URLLC usage scenarios creates a security problem for URLLC data transmission that cannot be solved using conventional complex cryptographic methods based on a secret key. The article discusses in detail the approach to using physical layer security mechanisms (physical layer security - PLS) as a powerful alternative to classical cryptographic security methods for URLLC, and also proposes the application of the wire-tap channel concept in URLLC with an analysis of the efficiency that can be achieved for physical layer security.
Objective. The aim of the article is to provide an overview of information security solutions in URLLC usage scenarios, as well as to propose a constructive method for information protection for reliable data transmission with low latency without the use of cryptographic mechanisms based on a secret key.
Methods. Theoretical research in the field of the branch channel concept was used to create solutions that allow data protection with information-theoretic stability in URLLC usage scenarios for providing IoT, connected car and autonomous driving services.
Results. The article examines in detail the data security issues in ultra-reliable low latency communication (URLLC) as a service offered by fifth and sixth generation (5G/6G) wireless systems. It is determined that URLLC is a technological response to the needs of various critical applications that require reliable signal transmission with low latency, and among these applications are Intelligent Transportation Systems services, which, among other things, provide connectivity and autonomous vehicle control. It is shown that the combination of high reliability and low latency requirements in URLLC scenarios creates a security problem for URLLC data transmission that cannot be solved using conventional complex cryptographic methods based on a secret key. The feasibility of using physical layer security mechanisms (PLS) as a powerful alternative to classical cryptographic security methods for URLLC is substantiated. The approach to applying the concept of a wire-tap channel in URLLC is considered in detail, as well as the results that can be achieved for physical layer security, and the influence of code parameters for probabilistic cryptographic transformations in accordance with the concept of a wire-tap channel on PLS URLLC. Estimates of the effectiveness of PLS URLLC for finite block length codes are provided.
Conclusions. An effective way to ensure data security for ultra-reliable low-latency physical layer link (PLS URLLC) of fifth-generation 5G wireless systems in the field of connected cars and vehicles of 4-5 levels of automation can be approaches based on the concept of a tapped channel ("wire-tap channel").
References
Yongpeng Wu; Ashish Khisti; Chengshan Xiao; Giuseppe Caire; Kai-Kit Wong; Xiqi Gao «A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead». IEEE Journal on Selected Areas in Communications, Volume: 36 (2018), Issue: 4, рр 679 -695
Wyner A.D. The wire-tap channel // Bell System Technical Journal. – 1975. – Vol. 54, № 8. – pp. 1355-1387.
Csisz´ar I., K¨orner J. Broadcast Channels with Confidential Messages // IEEE Trans. Inform. Theory. –1978. –Vol. 24, № 3. – pp. 339–348, May 1978.
Korzhik V.I., Yakovlev V.A. Non-asymptotic estimations of the effectiveness of the code noise of one channel // Problemy peredachi information. – 1981. – Volume 17, Issue 4. – pp. 11–18.
Korzhik V.I., Goritsky V.M., Otsenki effektivnosti metodov kodovogo zashumleniya [Assessment of the efficacy of code noise reduction techniques] // Specialized communication equipment. - Series: TPS. - Issue 1. - 1983. - pp. 74-83.
V.Y. Korzhik, V.M. Goritsky, Evaluation of the effectiveness of code noise methods // Specialized communication equipment. - Sir TPS - Issue 1. - 1983. - pp. 74-83.
Goritsky V.M. Probabilistic cryptography in information security systems: code protection // Electronics and Communications. - Issue 5. - 1998. - pp. 140-145.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
The ownership of copyright remains with the Authors.
Authors may use their own material in other publications provided that the Journal is acknowledged as the original place of publication and National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute” as the Publisher.
ITS articles are published under Creative Commons licence:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under CC BY 4.0that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.