Securing the control of digital beamforming
(2025) In Proceedings- Abstract
- With the increase of devices connected to 5G services, the importance of tuning User Equipment (UE) to their assigned frequency slot becomes increasingly vital. This paper approached this issue by securing the control signals sent through a Serial Peripheral Interface (SPI) in digital beamforming radios. This was done by securing three distinct components: the transmitting end of the channel, the transmission medium, and the receiving end of the channel. To secure the transmitter, a module was created that monitors transmitted messages to ensure correct operation. For the security of the transmission medium, a comparison study was performed between different error detecting and correcting algorithms against the authors' own solution... (More)
- With the increase of devices connected to 5G services, the importance of tuning User Equipment (UE) to their assigned frequency slot becomes increasingly vital. This paper approached this issue by securing the control signals sent through a Serial Peripheral Interface (SPI) in digital beamforming radios. This was done by securing three distinct components: the transmitting end of the channel, the transmission medium, and the receiving end of the channel. To secure the transmitter, a module was created that monitors transmitted messages to ensure correct operation. For the security of the transmission medium, a comparison study was performed between different error detecting and correcting algorithms against the authors' own solution comparing which alternatives were more effective at reducing the errors on a transmission line. For the receiving end, a dynamic lock-and-key system was implemented to make sure that the radios know that they are connected to a legitimate device. These three components were simulated and evaluated individually to ensure that each one provided its part of the secure system, and a post-synthesis simulation of a system with all three solutions was then performed to show that these aspects together can create a cohesive secure system. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/4fa75c67-46b3-44e8-a40c-84a4dacb90ff
- author
- Barany, Love
LU
; Eriksson, William
; Åhlund, Joel
LU
; Bakic, Daniel
; Larsson, Erik
LU
; Axmon, Joakim and Törmänen, Markus LU
- organization
- publishing date
- 2025
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- keywords
- Robustness, Hardware security, Data security, Integrated circuit reliability, Failure analysis, Fault detection
- host publication
- 2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)
- series title
- Proceedings
- pages
- 7 pages
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- ISSN
- 1942-9401
- 1942-9398
- ISBN
- 979-8-3315-3335-9
- 979-8-3315-3334-2
- DOI
- 10.1109/IOLTS65288.2025.11117109
- language
- English
- LU publication?
- yes
- id
- 4fa75c67-46b3-44e8-a40c-84a4dacb90ff
- date added to LUP
- 2025-09-01 14:57:44
- date last changed
- 2025-09-25 02:16:29
@inproceedings{4fa75c67-46b3-44e8-a40c-84a4dacb90ff, abstract = {{With the increase of devices connected to 5G services, the importance of tuning User Equipment (UE) to their assigned frequency slot becomes increasingly vital. This paper approached this issue by securing the control signals sent through a Serial Peripheral Interface (SPI) in digital beamforming radios. This was done by securing three distinct components: the transmitting end of the channel, the transmission medium, and the receiving end of the channel. To secure the transmitter, a module was created that monitors transmitted messages to ensure correct operation. For the security of the transmission medium, a comparison study was performed between different error detecting and correcting algorithms against the authors' own solution comparing which alternatives were more effective at reducing the errors on a transmission line. For the receiving end, a dynamic lock-and-key system was implemented to make sure that the radios know that they are connected to a legitimate device. These three components were simulated and evaluated individually to ensure that each one provided its part of the secure system, and a post-synthesis simulation of a system with all three solutions was then performed to show that these aspects together can create a cohesive secure system.}}, author = {{Barany, Love and Eriksson, William and Åhlund, Joel and Bakic, Daniel and Larsson, Erik and Axmon, Joakim and Törmänen, Markus}}, booktitle = {{2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)}}, isbn = {{979-8-3315-3335-9}}, issn = {{1942-9401}}, keywords = {{Robustness; Hardware security; Data security; Integrated circuit reliability; Failure analysis; Fault detection}}, language = {{eng}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, series = {{Proceedings}}, title = {{Securing the control of digital beamforming}}, url = {{http://dx.doi.org/10.1109/IOLTS65288.2025.11117109}}, doi = {{10.1109/IOLTS65288.2025.11117109}}, year = {{2025}}, }