2025 ASEE Annual Conference & Exposition

Secured Communication in the Physical Layer: An Interactive Module for Enhancing Cybersecurity Education in Next-Generation Wireless Communications

Presented at ECE-Cybersecurity and Quantum Technology Education

Introduction:
The increasing reliance on wireless communications, especially with the onset of 5G and the prospects of 6G, has been driven by transformative technological capabilities. These forthcoming 6G networks are expected to leverage an array of sophisticated technologies including post-quantum cryptography, artificial intelligence, machine learning, advanced edge computing, molecular communication, terahertz (THz), and visible light communication, as well as blockchain technologies [1], [2]. Such advancements promise to drastically enhance data transmission rates, facilitating instantaneous downloads, uninterrupted streaming, and swift access to digital content [2]. Moreover, they aim to support ultra-low latency applications vital for real-time services such as interactive online gaming and telesurgery [2], [3].
In light of these technological advances, there is a compelling necessity to reassess traditional security frameworks [1]. With the technological landscape rapidly expanding and user bases growing, securing communications is imperative to protect individual privacy, sensitive information, national security interests, and corporate operations, thereby maintaining integrity and trust in digital systems and services [1], [4]. Consequently, the escalating security challenges necessitate a proactive educational response to prepare future engineers for the emerging security demands of next-generation networks. It is important to modify the Electrical and Computer Engineering (ECE) curricula to incorporate advanced security concepts and protocols. Integrating these elements will ensure that security measures are fundamentally considered in the design and implementation of future communication systems.
This proposal advocates for the introduction of an innovative, interactive module focused on Secured Communication in the Physical Layer, designed to be seamlessly integrated into existing senior-level communication system courses within the ECE curriculum. This module, which utilizes a visualization tool within an open-source simulator, aims to elucidate the critical distinctions between secured and unsecured communications, thereby enhancing students’ understanding and skills in implementing robust communication security measures in their future engineering roles.

Goals and Objectives:
The primary objectives of this study encompass several key aspects:

 Advocacy for Proactive Security Measures: This research promotes the integration of secure communication practices into the foundational architecture of next-generation communication systems, highlighting the importance of proactive strategies rather than reactive responses.
 Cultivation of a Security-Centric Mindset: This study aims to develop a security-oriented perspective among undergraduate students. It emphasizes the critical role of secured communication within the fundamental concepts of Electrical and Computer Engineering, and related communication courses.
 Encouragement of Careers in Communication Systems: Focused on emerging technologies like 6G, this research seeks to inspire student interest in careers within the secure communication sector, underscoring the exciting opportunities available in this rapidly evolving field.
 Identification of Vulnerabilities: The study begins by identifying vulnerabilities in unsecured communication methods, offering a detailed exploration of potential threats and weaknesses that could compromise system integrity.
 Implementation of Advanced Security Approaches: Based on the vulnerabilities identified, the research integrates cutting-edge secure approaches designed to improve the resilience and robustness of communication systems.
 Development of a Structured Educational Module: The research concludes with the creation of a structured educational module. This module provides a detailed explanation of complex transceiver modulation and demodulation techniques along with the concept of secured communication, grounded in fundamental principles taught in Communication System courses.

Research Methodology and Activities:
In this educational module, we leveraged the GNU Radio Companion platform to thoroughly explore secure communication, focusing on critical aspects of Physical Layer Security such as Secret Key Generation, Secure Multi-Antenna Techniques, and Authentication for next-generation communication systems [5], [6]. To enrich the learning experience, we integrated interactive simulations, visualization tools, gamification of learning modules, real-time feedback systems, and collaborative projects to engage students in a practical, hands-on educational environment.
The primary emphasis of the module was on hands-on activities. Firstly, we have introduced to build an AM transceiver using open-source tools, such as GNU Radio. This practical approach helped students understand complex waveform generation parameters and deepen their grasp of communication intricacies. The exercises included exploring carrier wave extraction, envelope detection methods, and coherent demodulation processes for audio data transmission.
Secondly, the module included simulations of attack scenarios, such as eavesdropping on amplitude modulation, to evaluate the system's resilience against unauthorized interception and signal manipulation. An interactive exercise also guided students through implementing a sophisticated key generation mechanism, which is important for maintaining the confidentiality and integrity of transmitted audio signals [7].
Further practical sessions introduced the implementation of Binary Phase Shift Keying (BPSK) modulation and Differential Encoding, both with and without Software Defined Radio (SDR) [8]. To bridge theory with real-world applications, we incorporated Orthogonal Frequency Division Multiplexing (OFDM) based 5G communication schemes, providing students with hands-on experience with advanced communication technologies. Additionally, we introduce students to the Osmocom cellular network infrastructure for accessing the physical layer in 2G and 3G communications and explored 3GPP security mechanisms implemented in 4G/5G networks through the Open5GS open-source tool.
Assessment activities for each section included gamified quizzes and evaluations of security aspects to reinforce learning and measure knowledge acquisition. To assess the module's effectiveness, comprehensive surveys were conducted before and after its implementation. These surveys were designed to measure the evolution of students' understanding and engagement. The results from the post-module surveys indicated a significant enhancement in students’ comprehension of secured communication principles, affirming the success of the module in delivering substantial knowledge and skills.

References:
1) Abdel Hakeem SA, Hussein HH, Kim H. Security Requirements and Challenges of 6G Technologies and Applications. Sensors (Basel). 2022 Mar 2;22(5):1969. doi: 10.3390/s22051969. PMID: 35271113; PMCID: PMC8914636.
2) Mandloi, M., Gurjar, D., Pattanayak, P., & Nguyen, H. (2021). 5G and Beyond Wireless Systems. Springer.
3) Sufyan, A., Khan, K. B., Khashan, O. A., Mir, T., & Mir, U. (2023). From 5G to beyond 5G: A Comprehensive Survey of Wireless Network Evolution, Challenges, and Promising Technologies. Electronics, 12(10), 2200
4) I. Ahmad, S. Shahabuddin, T. Kumar, J. Okwuibe, A. Gurtov and M. Ylianttila, "Security for 5G and Beyond," in IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3682-3722, Fourthquarter 2019, doi: 10.1109/COMST.2019.2916180.
5) The Free & Open Source Radio Ecosystem · Gnu Radio. GNU Radio. (n.d.). https://www.gnuradio.org/
6) J. M. Hamamreh, H. M. Furqan and H. Arslan, "Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey," in IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1773-1828, Secondquarter 2019, doi: 10.1109/COMST.2018.2878035.
7) A. Albehadili, K. Al Shamaileh, A. Javaid, J. Oluoch and V. Devabhaktuni, "An Upper Bound on PHY-Layer Key Generation for Secure Communications Over a Nakagami-M Fading Channel With Asymmetric Additive Noise," in IEEE Access, vol. 6, pp. 28137-28149, 2018, doi: 10.1109/ACCESS.2018.2827925.
8) M. N. O. Sadiku and C. M. Akujuobi, "Software-defined radio: a brief overview," in IEEE Potentials, vol. 23, no. 4, pp. 14-15, Oct.-Nov. 2004, doi: 10.1109/MP.2004.1343223.

Authors
  1. Mehzabien Iqbal The University of Toledo, OH, USA [biography]
  2. Md Abdus Samad Bhuiyan Purdue University Northwest
  3. Quamar Niyaz Purdue University Northwest
Note

The full paper will be available to logged in and registered conference attendees once the conference starts on June 22, 2025, and to all visitors after the conference ends on June 25, 2025