Browsing by Author "Wei, Zhuangkun"
Now showing 1 - 18 of 18
Results Per Page
Sort Options
Item Open Access Adversarial reconfigurable intelligent surface against physical layer key generation(IEEE, 2023-04-12) Wei, Zhuangkun; Li, Bin; Guo, WeisiThe development of reconfigurable intelligent surfaces (RIS) has recently advanced the research of physical layer security (PLS). Beneficial impacts of RIS include but are not limited to offering a new degree-of-freedom (DoF) for key-less PLS optimization, and increasing channel randomness for physical layer secret key generation (PL-SKG). However, there is a lack of research studying how adversarial RIS can be used to attack and obtain legitimate secret keys generated by PL-SKG. In this work, we show an Eve-controlled adversarial RIS (Eve-RIS), by inserting into the legitimate channel a random and reciprocal channel, can partially reconstruct the secret keys from the legitimate PL-SKG process. To operationalize this concept, we design Eve-RIS schemes against two PL-SKG techniques used: (i) the CSI-based PL-SKG, and (ii) the two-way cross multiplication based PL-SKG. The channel probing at Eve-RIS is realized by compressed sensing designs with a small number of radio-frequency (RF) chains. Then, the optimal RIS phase is obtained by maximizing the Eve-RIS inserted deceiving channel. Our analysis and results show that even with a passive RIS, our proposed Eve-RIS can achieve a high key match rate with legitimate users, and is resistant to most of the current defensive approaches. This means the novel Eve-RIS provides a new eavesdropping threat on PL-SKG, which can spur new research areas to counter adversarial RIS attacks.Item Open Access Control layer security: a new security paradigm for cooperative autonomous systems(IEEE, 2023-07-21) Guo, Weisi; Wei, Zhuangkun; Gonzalez, Oscar; Perrusquía, Adolfo; Tsourdos, AntoniosAutonomous systems often cooperate to ensure safe navigation. Embedded within the centralised or distributed coordination mechanisms are a set of observations, unobservable states, and control variables. Security of data transfer between autonomous systems is crucial for safety, and both cryptography and physical layer security methods have been used to secure communication surfaces - each with its drawbacks and dependencies. Here, we show for the first time a new wireless Control Layer Security (CLS) mechanism. CLS exploits mutual physical states between cooperative autonomous systems to generate cipher keys. These mutual states are chosen to be observable to legitimate users and not sufficient to eavesdroppers, thereby enhancing the resulting secure capacity. The CLS cipher keys can encrypt data without key exchange or a common key pool, and offers very low information leakage. As such the security of digital data channels is now dependent on physical state estimation rather than wireless channel estimation. This protects the estimation process from wireless jamming and channel entropy dependency. We review for first time what kind of signal processing techniques are used for hidden state estimation and key generation, and the performance of CLS in different case studies.Item Open Access Eavesdropping against bidirectional physical layer secret key generation in fiber communications(IEEE, 2022-12-14) Hu, Wenxiu; Wei, Zhuangkun; Leeson, Mark; Xu, TianhuaPhysical layer secret key exploits the random but reciprocal channel features between legitimate users to encrypt their data against fiber-tapping. We propose a novel tapping-based eavesdropper scheme, leveraging its tapped signals from legitimate users to reconstruct their common features and the secret key.Item Open Access Frequency domain analysis and equalization for molecular communication(IEEE, 2021-03-17) Huang, Yu; Ji, Fei; Wei, Zhuangkun; Wen, Miaowen; Chen, Xuan; Tang, Yuankun; Guo, WeisiMolecular Communication (MC) is a promising micro-scale technology that enables wireless connectivity in electromagnetically challenged conditions. The signal processing approaches in MC are different from conventional wireless communications as molecular signals suffer from severe inter-symbol interference (ISI) and signal-dependent counting noise due to the stochastic diffusion process of the information molecules. One of the main challenges in MC is the high computational complexity of the existing time-domain ISI mitigation schemes that display a third-order polynomial or even exponential growth with the ISI length, which is further exasperated under the high symbol rate case. For the first time, we develop a frequency-domain equalization (FDE) with lower complexity, capable of achieving independence from the ISI effects. This innovation is grounded in our characterization of the channel frequency response of diffusion signals, facilitating the design of receiver sampling strategies. However, the perfect counting noise power is unavailable in the optimal minimum mean square error (MMSE) equalizer. We address this issue by exploiting the statistical information of the transmit signal and decision feedback for noise power estimation, designing novel MMSE equalizers with low complexity. The FDE for MC is successfully developed with its immunity to ISI effects, and its signal processing cost has only a logarithmic growth with symbol length in each block.Item Open Access Graph layer security: encrypting information via common networked physics(MDPI, 2022-05-23) Wei, Zhuangkun; Wang, Liang; Sun, Schyler Chengyao; Li, Bin; Guo, WeisiThe proliferation of low-cost Internet of Things (IoT) devices has led to a race between wireless security and channel attacks. Traditional cryptography requires high computational power and is not suitable for low-power IoT scenarios. Whilst recently developed physical layer security (PLS) can exploit common wireless channel state information (CSI), its sensitivity to channel estimation makes them vulnerable to attacks. In this work, we exploit an alternative common physics shared between IoT transceivers: the monitored channel-irrelevant physical networked dynamics (e.g., water/oil/gas/electrical signal-flows). Leveraging this, we propose, for the first time, graph layer security (GLS), by exploiting the dependency in physical dynamics among network nodes for information encryption and decryption. A graph Fourier transform (GFT) operator is used to characterise such dependency into a graph-bandlimited subspace, which allows the generation of channel-irrelevant cipher keys by maximising the secrecy rate. We evaluate our GLS against designed active and passive attackers, using IEEE 39-Bus system. Results demonstrate that GLS is not reliant on wireless CSI, and can combat attackers that have partial networked dynamic knowledge (realistic access to full dynamic and critical nodes remains challenging). We believe this novel GLS has widespread applicability in secure health monitoring and for digital twins in adversarial radio environments.Item Open Access Hamming–Luby rateless codes for molecular erasure channels(Elsevier, 2019-11-27) Wei, Zhuangkun; Li, Bin; Hu, Wenxiu; Guo, Weisi; Zhao, ChenglinNano-scale molecular communications encode digital information into discrete macro-molecules. In many nano-scale systems, due to limited molecular energy, each information symbol is encoded into a small number of molecules. As such, information may be lost in the process of diffusion–advection propagation through complex topologies and membranes. Existing Hamming-distance codes for additive counting noise are not well suited to combat the aforementioned erasure errors. Rateless Luby-Transform (LT) code and cascaded Hamming-LT (Raptor) are suitable for information-loss, however may consume substantially computational energy due to the repeated uses of random number generator and exclusive OR (XOR). In this paper, we design a novel low-complexity erasure combating encoding scheme: the rateless Hamming–Luby Transform code. The proposed rateless code combines the superior efficiency of Hamming codes with the performance guarantee advantage of Luby Transform (LT) codes, therefore can reduce the number of random number generator utilizations. We design an iterative soft decoding scheme via successive cancelation to further improve the performance. Numerical simulations show this new rateless code can provide comparable performance comparing with both standard LT and Raptor codes, while incurring a lower decoder computational complexity, which is useful for the envisaged resources constrained nano-machinesItem Open Access High-dimensional metric combining for non-coherent molecular signal detection(IEEE, 2019-12-13) Wei, Zhuangkun; Guo, Weisi; Li, Bin; Charmet, Jérôme; Zhao, ChenglinIn emerging Internet-of-Nano-Thing (IoNT), information will be embedded and conveyed in the form of molecules through complex and diffusive medias. One main challenge lies in the long-tail nature of the channel response causing inter-symbol-interference (ISI), which deteriorates the detection performance. If the channel is unknown, existing coherent schemes (e.g., the state-of-the-art maximum a posteriori, MAP) have to pursue complex channel estimation and ISI mitigation techniques, which will result in either high computational complexity, or poor estimation accuracy that will hinder the detection performance. In this paper, we develop a novel high-dimensional non-coherent detection scheme for molecular signals. We achieve this in a higher-dimensional metric space by combining different non-coherent metrics that exploit the transient features of the signals. By deducing the theoretical bit error rate (BER) for any constructed high-dimensional non-coherent metric, we prove that, higher dimensionality always achieves a lower BER in the same sample space, at the expense of higher complexity on computing the multivariate posterior densities. The realization of this high-dimensional non-coherent scheme is resorting to the Parzen window technique based probabilistic neural network (Parzen-PNN), given its ability to approximate the multivariate posterior densities by taking the previous detection results into a channel-independent Gaussian Parzen window, thereby avoiding the complex channel estimations. The complexity of the posterior computation is shared by the parallel implementation of the Parzen-PNN. Numerical simulations demonstrate that our proposed scheme can gain 10dB in SNR given a fixed BER as 10 -4 , in comparison with other state-of-the-art methods.Item Open Access A multi-eavesdropper scheme against RIS secured LoS-dominated channel(IEEE, 2022-04-11) Wei, Zhuangkun; Guo, Weisi; Li, BinReconfigurable intelligent surface (RIS) has been shown as a promising technique to increase the channel randomness for secret key generation (SKG) in low-entropy channels (e.g., static or line-of-sight (LoS)), without small-scale fading. In this letter, we show that even with the aid of RIS, collaborative eavesdroppers (Eves) can still estimate the legitimate Alice-Bob channel and erode their secret key rates (SKRs), since the RIS induced randomness is also reflected in the Eves’ observations. Conditioned on Eves’ observations, if the entropy of RIS-combined legitimate channel is zero, Eves are able to estimate it and its secret key. Leveraging this, we design a multi-Eve scheme against the RIS-secured LoS dominated scenarios, by using the multiple Eves’ observations to reconstruct the RIS-combined legitimate channel. We further deduce a closed-form secret key leakage rate under our designed multi-Eve scheme, and demonstrate the results via simulations.Item Open Access Neural network approximation of graph Fourier transform for sparse sampling of networked dynamics(Association for Computing Machinery (ACM), 2021-09-14) Pagani, Alessio; Wei, Zhuangkun; Silva, Ricardo; Guo, WeisiInfrastructure monitoring is critical for safe operations and sustainability. Like many networked systems, water distribution networks (WDNs) exhibit both graph topological structure and complex embedded flow dynamics. The resulting networked cascade dynamics are difficult to predict without extensive sensor data. However, ubiquitous sensor monitoring in underground situations is expensive, and a key challenge is to infer the contaminant dynamics from partial sparse monitoring data. Existing approaches use multi-objective optimization to find the minimum set of essential monitoring points but lack performance guarantees and a theoretical framework. Here, we first develop a novel Graph Fourier Transform (GFT) operator to compress networked contamination dynamics to identify the essential principal data collection points with inference performance guarantees. As such, the GFT approach provides the theoretical sampling bound. We then achieve under-sampling performance by building auto-encoder (AE) neural networks (NN) to generalize the GFT sampling process and under-sample further from the initial sampling set, allowing a very small set of data points to largely reconstruct the contamination dynamics over real and artificial WDNs. Various sources of the contamination are tested, and we obtain high accuracy reconstruction using around 5%–10% of the network nodes for known contaminant sources, and 50%–75% for unknown source cases, which although larger than that of the schemes for contaminant detection and source identifications, is smaller than the current sampling schemes for contaminant data recovery. This general approach of compression and under-sampled recovery via NN can be applied to a wide range of networked infrastructures to enable efficient data sampling for digital twins.Item Open Access Physical-layer counterattack strategies for the internet of bio-nano things with molecular communication(IEEE, 2023-06-06) Huang, Yu; Wen, Miaowen; Lin, Lin; Li, Bin; Wei, Zhuangkun; Tang, Dong; Li, Jun; Duan, Wei; Guo, WeisiMolecular communication (MC) is an emerging new communication paradigm where information is conveyed by chemical signals. It has been recognized as one of the most promising physical layer techniques for the future Internet of Bio-Nano Things (IoBNT), which enables revolutionary applications beyond our imagination. Compared with conventional communication systems, MC typically demands a higher security level as the IoBNT is deeply associated with the biochemical process. Against this background, this article first discusses the security and privacy issues of IoBNT with MC. Then, the physical-layer countermeasures against the threat are presented from an interdisciplinary perspective concerning data science, signal processing techniques, and the biochemical properties of MC. Correspondingly, both the keyless and key-based schemes are conceived and revisited. Finally, some open research issues and future research directions for secrecy enhancement in IoBNT with MC are put forward.Item Open Access A review of digital twin technologies for enhanced sustainability in the construction industry(MDPI, 2024-04-16) Zhang, Zichao; Wei, Zhuangkun; Court, Samuel; Yang, Lichao; Wang, Shuozhi; Thirunavukarasu, Arjun; Zhao, YifanCarbon emissions present a pressing challenge to the traditional construction industry, urging a fundamental shift towards more sustainable practices and materials. Recent advances in sensors, data fusion techniques, and artificial intelligence have enabled integrated digital technologies (e.g., digital twins) as a promising trend to achieve emission reduction and net-zero. While digital twins in the construction sector have shown rapid growth in recent years, most applications focus on the improvement of productivity, safety and management. There is a lack of critical review and discussion of state-of-the-art digital twins to improve sustainability in this sector, particularly in reducing carbon emissions. This paper reviews the existing research where digital twins have been directly used to enhance sustainability throughout the entire life cycle of a building (including design, construction, operation and maintenance, renovation, and demolition). Additionally, we introduce a conceptual framework for this industry, which involves the elements of the entire digital twin implementation process, and discuss the challenges faced during deployment, along with potential research opportunities. A proof-of-concept example is also presented to demonstrate the validity of the proposed conceptual framework and potential of digital twins for enhanced sustainability. This study aims to inspire more forward-thinking research and innovation to fully exploit digital twin technologies and transform the traditional construction industry into a more sustainable sector.Item Open Access Review of physical layer security in molecular internet of nano-things(IEEE, 2023-06-14) Qiu, Song; Wei, Zhuangkun; Huang, Yu; Abbaszadeh, Mahmoud; Charmet, Jerome; Li, Bin; Guo, WeisiMolecular networking has been identified as a key enabling technology for Internet-of-Nano-Things (IoNT): microscopic devices that can monitor, process information, and take action in a wide range of medical applications. As the research matures into prototypes, the cybersecurity challenges of molecular networking are now being researched on at both the cryptographic and physical layer level. Due to the limited computation capabilities of IoNT devices, physical layer security (PLS) is of particular interest. As PLS leverages on channel physics and physical signal attributes, the fact that molecular signals differ significantly from radio frequency signals and propagation means new signal processing methods and hardware is needed. Here, we review new vectors of attack and new methods of PLS, focusing on 3 areas: (1) information theoretical secrecy bounds for molecular communications, (2) key-less steering and decentralized key-based PLS methods, and (3) new methods of achieving encoding and encryption through bio-molecular compounds. The review will also include prototype demonstrations from our own lab that will inform future research and related standardization efforts.Item Open Access Robust time synchronisation for industrial internet of things by H∞ output feedback control(IEEE, 2022-01-20) Zong, Yan; Dai, Xuewu; Wei, Zhuangkun; Zou, Mengbang; Guo, Weisi; Gao, ZhiweiPrecise timing over timestamped packet exchange communication is an enabling technology in the mission-critical industrial Internet of Things, particularly when satellite-based timing is unavailable. The main challenge is to ensure timing accuracy when the clock synchronisation system is subject to disturbances caused by the drifting frequency, time-varying delay, jitter, and timestamping uncertainty. In this work, a Robust Packet-Coupled Oscillators (R-PkCOs) protocol is proposed to reduce the effects of perturbations manifested in the drifting clock, timestamping uncertainty and delays. First, in the spanning tree clock topology, time synchronisation between an arbitrary pair of clocks is modelled as a state-space model, where clock states are coupled with each other by one-way timestamped packet exchange (referred to as packet coupling), and the impacts of both drifting frequency and delays are modelled as disturbances. A static output controller is adopted to adjust the drifting clock. The H∞ robust control design solution is proposed to guarantee that the ratio between the modulus of synchronisation precision and the magnitude of the disturbances is always less than a given value. Therefore, the proposed time synchronisation protocol is robust against the disturbances, which means that the impacts of drifting frequency and delays on the synchronisation accuracy are limited. The one-hour experimental results demonstrate that the proposed R-PkCOs protocol can realise time synchronisation with the precision of six microseconds in a 21-node IEEE 802.15.4 network. This work has widespread impacts in the process automation of automotive, mining, oil and gas industries.Item Open Access Sampling and inference of networked dynamics using Log-Koopman nonlinear graph fourier transform(IEEE, 2020-10-21) Wei, Zhuangkun; Li, Bin; Sun, Chengyao; Guo, WeisiMonitoring the networked dynamics via the subset of nodes is essential for a variety of scientific and operational purposes. When there is a lack of an explicit model and networked signal space, traditional observability analysis and non-convex methods are insufficient. Current data-driven Koopman linearization, although derives a linear evolution model for selected vector-valued observable of original state-space, may result in a large sampling set due to: (i) the large size of polynomial based observables (O(N2) , N number of nodes in network), and (ii) not factoring in the nonlinear dependency betweenobservables. In this work, to achieve linear scaling (O(N) ) and a small set of sampling nodes, wepropose to combine a novel Log-Koopman operator and nonlinear Graph Fourier Transform (NL-GFT) scheme. First, the Log-Koopman operator is able to reduce the size of observables by transforming multiplicative poly-observable to logarithm summation. Second, anonlinear GFT concept and sampling theory are provided to exploit the nonlinear dependence of observables for observability analysis using Koopman evolution model. The results demonstrate that the proposed Log-Koopman NL-GFT scheme can (i) linearize unknownnonlinear dynamics using O(N) observables, and (ii) achieve lower number of sampling nodes, compared with the state-of-the art polynomial Koopman based observability analysis.Item Open Access Scarce data driven deep learning of drones via generalized data distribution space(Springer, 2023-04-06) Li, Chen; Sun, Schyler C.; Wei, Zhuangkun; Tsourdos, Antonios; Guo, WeisiIncreased drone proliferation in civilian and professional settings has created new threat vectors for airports and national infrastructures. The economic damage for a single major airport from drone incursions is estimated to be millions per day. Due to the lack of balanced representation in drone data, training accurate deep learning drone detection algorithms under scarce data is an open challenge. Existing methods largely rely on collecting diverse and comprehensive experimental drone footage data, artificially induced data augmentation, transfer and meta-learning, as well as physics-informed learning. However, these methods cannot guarantee capturing diverse drone designs and fully understanding the deep feature space of drones. Here, we show how understanding the general distribution of the drone data via a generative adversarial network (GAN), and explaining the under-learned data features using topological data analysis (TDA) can allow us to acquire under-represented data to achieve rapid and more accurate learning. We demonstrate our results on a drone image dataset, which contains both real drone images as well as simulated images from computer-aided design. When compared to random, tag-informed and expert-informed data collections (discriminator accuracy of 94.67%, 94.53% and 91.07%, respectively, after 200 epochs), our proposed GAN-TDA-informed data collection method offers a significant 4% improvement (99.42% after 200 epochs). We believe that this approach of exploiting general data distribution knowledge from neural networks can be applied to a wide range of scarce data open challenges.Item Open Access Signal detection for molecular communication: model-based vs. data-driven methods(IEEE, 2021-06-03) Huang, Yu; Ji, Fei; Wei, Zhuangkun; Wen, MiaowenMulti-scale molecular communication (MC) employs the characteristics of information molecules for information exchange. The received signal in MC inevitably encounters severe inter-symbol interference and signal-dependent noise due to the stochastic diffusion mechanism. Focusing on the critical signal detection in MC, first this article reviews the commonly used mod-el-based detectors and exposes their limitations in practical implementation. Then the emerging data-driven detectors that can make up for some deficiencies of the model-based detectors are presented. Despite the black-box nature of the data-driven detectors, the explainable artificial intelligence can be further investigated for the performance improvement of transparency and trust. Finally, some open research issues and future research directions in receiver design are discussed.Item Open Access Tapping eavesdropper designs against physical layer secret key in point-to-point fiber communications(IEEE, 2022-11-17) Hu, Wenxiu; Wei, Zhuangkun; Popov, Sergei; Leeson, Mark; Xu, TianhuaWith the growing demand for service access and data transmission, security issues in optical fiber systems have become increasingly important and the subject of increased research. Physical layer secret key generation (PL-SKG), which leverages the random but common channel properties at legitimate parties, has been shown to be a secure, low-cost, and easily deployed technique as opposed to computational-based cryptography, quantum, and chaos key methods that rely on precise equipment. However, the eavesdropper (Eve) potential for current PL-SKG in fiber communications has been overlooked by most studies to date. Unlike wireless communications, where the randomness comes from the spatial multi-paths that cannot be all captured by Eves, in fiber communications, all the randomness (from transmitted random pilots or channel randomness) is contained in the signals transmitted inside the fiber. This, therefore, enables a tapping Eve to reconstruct the common features of legitimate users from its received signals, and further decrypt the featured-based secret keys. To implement this idea, we designed two Eve schemes against polarization mode distortion (PMD) based PL-SKG and the two-way cross multiplication based PL-SKG. The simulation results show that our proposed Eves can successfully reconstruct the legitimate common feature and the secret key relied upon, leading to secret key rate (SKR) reductions of between three and four orders of magnitude in the PL-SKG schemes studied. As a result, we reveal and demonstrate a novel eavesdropping potential to provide challenges for current physical layer secret key designs. We hope to provide more insightful vision and critical evaluation on the design of new physical layer secret key schemes in optical fiber links, to provide more comprehensively secure, and intelligent optical networks.Item Open Access Uncovering drone intentions using control physics informed machine learning(Springer Nature, 2024-02-24) Perrusquía, Adolfo; Guo, Weisi; Fraser, Benjamin; Wei, Zhuangkun; This work was supported by the Engineering and Physical Sciences Research Council under Grant EP/V026763/1 and by the Royal Academy of Engineering and the Office of the Chief Science Adviser for National Security under the UK Intelligence Community Postdoctoral Research Fellowship programme.Unmanned Autonomous Vehicle (UAV) or drones are increasingly used across diverse application areas. Uncooperative drones do not announce their identity/flight plans and can pose a potential risk to critical infrastructures. Understanding drone’s intention is important to assigning risk and executing countermeasures. Intentions are often intangible and unobservable, and a variety of tangible intention classes are often inferred as a proxy. However, inference of drone intention classes using observational data alone is inherently unreliable due to observational and learning bias. Here, we developed a control-physics informed machine learning (CPhy-ML) that can robustly infer across intention classes. The CPhy-ML couples the representation power of deep learning with the conservation laws of aerospace models to reduce bias and instability. The CPhy-ML achieves a 48.28% performance improvement over traditional trajectory prediction methods. The reward inference results outperforms conventional inverse reinforcement learning approaches, decreasing the root mean squared spectral norm error from 3.3747 to 0.3229.