SAQ1 – Quantum & Physical layer security
Wednesday, 4 June 2025, 11:00-12:30, room 1.B
Session Chair: Maciej Krasicki (Poznan University of Technology, PL)
A Robust Fingerprinting Mechanism Based on Amplifier Non Linearities
Mauro Biagi (Sapienza University of Rome, Italy); Valeria Loscrí (Inria Lille-Nord Europe, France)
This paper proposes a novel fingerprinting method by applying the controlled non-linearities of RF amplifiers in compression mode to generate robust signal signatures. By analyzing the distinct distortion patterns and harmonic content produced under compression, we define a signaling mechanism helping to generate a robust fingerprinting mechanism. Our approach presents an ability to generate confusion in eavesdroppers so ensuring high robustness and resilience against passive and active attacks. Numerical results demonstrate the consistency and robustness of the signal signatures. This method not only enhances security by integrating physical-layer properties, but may contribute to reduce the computational burden of traditional cryptographic techniques. Our findings indicate that using amplifier non-linearities for fingerprinting significantly improves the security and efficiency of wireless communication systems.
On Jamming Detection: a Unified Method for Real-Time Detection Across Multiple Protocols & Attack Types
Alexandros Ioannis Papadopoulos (University of Ioannina, Greece & Information Technologies Institute, Greece); Konstantinos Nikiforidis, Odysseas Grosomanidis and Eleni Chamou (CERTH, Greece); Savvas Raptis (Aristotle University of Thessaloniki, Greece); Aristeides Papadopoulos (CERTH, Greece); Antonios Lalas (Centre for Research and Technology – Hellas (CERTH), Greece); Konstantinos Votis (Information Technologies Institute, Centre For Research and Technology Hellas, Greece)
Jamming attacks continue to pose a significant threat to next-generation wireless networks, including Beyond 5G (B5G) and 6G, by disrupting communication through intentional interference. In this paper, we introduce JAmming detection method baSed on Modulation scheme IdeNtification and Outlier Detector of un-jammed data (JASMIN), a novel jamming detection method designed to operate effectively across a broad range of network protocols and jamming scenarios. JASMIN relies solely on unjammed data during its training phase and utilizes two primary components in its detection phase: a Modulation Scheme Identification (MSI) model that classifies the legitimate signal’s modulation format, and an Outlier Detector (OD) that quantifies channel noise. By comparing the predicted modulation scheme over multiple time windows with the OD’s measurements of noise, JASMIN identifies abnormal interference that indicates the presence of jamming-regardless of the specific jamming strategy (e.g., constant, periodic, reactive).
We demonstrate the efficacy of JASMIN on an SDR-based testbed implementing an IEEE 802.11p (V2X) communication network, employing three USRP B210 devices operating at 5.9 GHz. Evaluation results show an overall accuracy of 99.92% under a wide range of SNR levels. Additionally, JASMIN’s real-time compatibility and minimal computational overhead make it a compelling solution for modern wireless systems. To foster further innovation, we publicly release the dataset utilized in our experiments.
Relaxing Trust Assumptions on Quantum Key Distribution Networks
Nilesh Vyas and Paulo Mendes (Airbus, Germany)
Quantum security over long distances with untrusted relays is largely unfounded and is still an open question for active research. Standard Quantum Key Distribution Network (QKDN) architecture demands full trust in QKD relays, which is too restrictive and limits QKDN applications. We investigate secure secret relaying in QKDNs by relaxing the trust assumptions (if not completely) on the relay. We classify QKD relays into Full Access Trust (FAT), Partial Access Trust (PAT), and No Access Trust (NAT) levels, each reflecting the required trust on the key management system for end-to-end communication. We review and propose QKD key management systems based on these trust levels. We propose a new decentralized key management system and review key management within a centralized topology. These different approaches offer various advantages based on QKDN requirements, granting operational flexibility. We believe this work offers a fresh perspective on the challenge of ensuring secure long-range communications in the future.
Physical Layer Deception in OFDM Systems
Wenwen Chen (Rheinland-Pfälzische Technische Universität Kaiserslautern-Landau (RPTU), Germany); Bin Han (RPTU Kaiserslautern-Landau, Germany); Yao Zhu (RWTH Aachen, Germany); Anke Schmeink (RWTH Aachen University, Germany); Hans D. Schotten (RPTU Kaiserslautern-Landau, Germany)
As a promising technology, physical layer security (PLS) enhances security by leveraging the physical characteristics of communication channels. However, it commonly takes the legitimate user more effort to secure its data, compared to that required by the eavesdropper to intercept the communication. To address this imbalance, we propose a physical layer deception (PLD) framework, which applies random deceptive ciphering combined with orthogonal frequency-division multiplexing (OFDM) to deceive eavesdroppers with falsified information, preventing them from wiretapping. While ensuring the same level of confidentiality as traditional PLS methods, the PLD approach additionally introduces a deception mechanism, which remains effective even when the eavesdropper has the same knowledge about the transmitter as the legitimate receiver. Through detailed theoretical analysis and numerical simulations, we prove the superiority of our method over the conventional PLS approach.
Securing Mobile Networks in the Quantum Era: Imperative Role of Post-Quantum Cryptography
Sogo Pierre Sanon (German Research Center for Artificial Intelligence, Germany); Hans Dieter Schotten (Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, Germany)
In the rapidly evolving telecommunications landscape, the advent of 6G networks promises unparalleled connectivity and transformative capabilities. However, as the potential of 6G unfolds, so too do the security challenges, particularly in the face of quantum computing advancements. Post-Quantum Cryptography (PQC) emerges as a critical safeguard against potential threats to data integrity and confidentiality in 6G networks. This paper addresses the critical role of PQC in safeguarding 6G networks against these quantum-based threats. It analyzes the potential vulnerabilities posed by quantum computing, reviews the existing landscape of quantum-safe cryptographic solutions, and assesses their implications for mobile security. The paper also outlines the necessary steps for transitioning to quantum-safe mobile networks, supported by insights from governmental and institutional recommendations.






















