Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Securing the control of digital beamforming

Barany, Love LU ; Eriksson, William ; Åhlund, Joel LU ; Bakic, Daniel ; Larsson, Erik LU orcid ; Axmon, Joakim and Törmänen, Markus LU orcid (2025) In Proceedings
Abstract
With the increase of devices connected to 5G services, the importance of tuning User Equipment (UE) to their assigned frequency slot becomes increasingly vital. This paper approached this issue by securing the control signals sent through a Serial Peripheral Interface (SPI) in digital beamforming radios. This was done by securing three distinct components: the transmitting end of the channel, the transmission medium, and the receiving end of the channel. To secure the transmitter, a module was created that monitors transmitted messages to ensure correct operation. For the security of the transmission medium, a comparison study was performed between different error detecting and correcting algorithms against the authors' own solution... (More)
With the increase of devices connected to 5G services, the importance of tuning User Equipment (UE) to their assigned frequency slot becomes increasingly vital. This paper approached this issue by securing the control signals sent through a Serial Peripheral Interface (SPI) in digital beamforming radios. This was done by securing three distinct components: the transmitting end of the channel, the transmission medium, and the receiving end of the channel. To secure the transmitter, a module was created that monitors transmitted messages to ensure correct operation. For the security of the transmission medium, a comparison study was performed between different error detecting and correcting algorithms against the authors' own solution comparing which alternatives were more effective at reducing the errors on a transmission line. For the receiving end, a dynamic lock-and-key system was implemented to make sure that the radios know that they are connected to a legitimate device. These three components were simulated and evaluated individually to ensure that each one provided its part of the secure system, and a post-synthesis simulation of a system with all three solutions was then performed to show that these aspects together can create a cohesive secure system. (Less)
Please use this url to cite or link to this publication:
author
; ; ; ; ; and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Robustness, Hardware security, Data security, Integrated circuit reliability, Failure analysis, Fault detection
host publication
2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)
series title
Proceedings
pages
7 pages
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
ISSN
1942-9401
1942-9398
ISBN
979-8-3315-3335-9
979-8-3315-3334-2
DOI
10.1109/IOLTS65288.2025.11117109
language
English
LU publication?
yes
id
4fa75c67-46b3-44e8-a40c-84a4dacb90ff
date added to LUP
2025-09-01 14:57:44
date last changed
2025-09-25 02:16:29
@inproceedings{4fa75c67-46b3-44e8-a40c-84a4dacb90ff,
  abstract     = {{With the increase of devices connected to 5G services, the importance of tuning User Equipment (UE) to their assigned frequency slot becomes increasingly vital. This paper approached this issue by securing the control signals sent through a Serial Peripheral Interface (SPI) in digital beamforming radios. This was done by securing three distinct components: the transmitting end of the channel, the transmission medium, and the receiving end of the channel. To secure the transmitter, a module was created that monitors transmitted messages to ensure correct operation. For the security of the transmission medium, a comparison study was performed between different error detecting and correcting algorithms against the authors' own solution comparing which alternatives were more effective at reducing the errors on a transmission line. For the receiving end, a dynamic lock-and-key system was implemented to make sure that the radios know that they are connected to a legitimate device. These three components were simulated and evaluated individually to ensure that each one provided its part of the secure system, and a post-synthesis simulation of a system with all three solutions was then performed to show that these aspects together can create a cohesive secure system.}},
  author       = {{Barany, Love and Eriksson, William and Åhlund, Joel and Bakic, Daniel and Larsson, Erik and Axmon, Joakim and Törmänen, Markus}},
  booktitle    = {{2025 IEEE 31st International Symposium on On-Line Testing and Robust System Design (IOLTS)}},
  isbn         = {{979-8-3315-3335-9}},
  issn         = {{1942-9401}},
  keywords     = {{Robustness; Hardware security; Data security; Integrated circuit reliability; Failure analysis; Fault detection}},
  language     = {{eng}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  series       = {{Proceedings}},
  title        = {{Securing the control of digital beamforming}},
  url          = {{http://dx.doi.org/10.1109/IOLTS65288.2025.11117109}},
  doi          = {{10.1109/IOLTS65288.2025.11117109}},
  year         = {{2025}},
}