Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December.

Slides:



Advertisements
Similar presentations
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Advertisements

VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
OFDM Modulated Cooperative Multiple-Access Channel With Network-Channel Coding.
Enhancing Secrecy With Channel Knowledge
HKUST Robust Optimal Cross Layer Designs for TDD- OFDMA Systems with Imperfect CSIT and Unknown Interference — State-Space Approach based on 1-bit.
SUCCESSIVE INTERFERENCE CANCELLATION IN VEHICULAR NETWORKS TO RELIEVE THE NEGATIVE IMPACT OF THE HIDDEN NODE PROBLEM Carlos Miguel Silva Couto Pereira.
Adaptive Multiple Relay Selection Scheme for Cooperative Wireless Networks WCNC 2010 Gayan Amarasuriya, Masoud Ardakani and Chintha Tellambura {amarasur,
Optimization of pilot Locations in Adaptive M-PSK Modulation in a Rayleigh Fading Channel Khaled Almustafa Information System Prince Sultan University.
An Authentication Scheme for Mobil Satellite Communication Systems Advisor: Prof. Jen-Chang Liu Graduate Student: Yi-Ching Chen( 陳怡靜 ) Date: 2004/05/26.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Modeling OFDM Radio Channel Sachin Adlakha EE206A Spring 2001.
Space Time Block Codes Poornima Nookala.
Comparison Between Communication Infrastructures of Centralized and Decentralized Wide Area Measurement Systems Mohammad Shahraeini, Mohammad Hossein Javidi,
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
The National Centres of Competence in Research are managed by the Swiss National Science Foundation on behalf of the Federal Authorities NCCR MICS review.
MIMO-OFDM MIMO MIMO High diversity gain (space-time coding) High diversity gain (space-time coding) High multiplexing gain (BLAST) High multiplexing gain.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Doc.: IEEE /1399r0 Submission November 2014 Multi-Carrier Training Field for OFDM Transmission in aj (45GHz) Authors/contributors: Date:
Cooperative Diversity Scheme Based on MIMO-OFDM in Small Cell Network Dong-Hyun Ha Sejong University.
On the Coded Complex Field Network Coding Scheme for Multiuser Cooperative Communications with Regenerative Relays Caixi Key Lab of Information.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
1 IEEE Trans. on Smart Grid, 3(1), pp , Optimal Power Allocation Under Communication Network Externalities --M.G. Kallitsis, G. Michailidis.
An algorithm for dynamic spectrum allocation in shadowing environment and with communication constraints Konstantinos Koufos Helsinki University of Technology.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
EE360 PRESENTATION On “Mobility Increases the Capacity of Ad-hoc Wireless Networks” By Matthias Grossglauser, David Tse IEEE INFOCOM 2001 Chris Lee 02/07/2014.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
by P. Sriploy, M. Uthansakul and R. Wongsan
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
Contact: Robust Wireless Communication System for Maritime Monitoring Robust Wireless Communication System for Maritime Monitoring.
Performance of Energy Detection: A Complementary AUC Approach
Fen Hou and Pin-Han Ho Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Wireless Communications and Mobile.
1 Mobility Increases the Capacity of Ad-hoc Wireless Networks Matthias Grossglauser, David Tse IEEE Infocom 2001 (Best paper award) Oct 21, 2004 Som C.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Wireless Mobile Communication and Transmission Lab. Chapter 8 Application of Error Control Coding.
Ali Al-Saihati ID# Ghassan Linjawi
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Space-Time and Space-Frequency Coded Orthogonal Frequency Division Multiplexing Transmitter Diversity Techniques King F. Lee.
Downlink Scheduling With Economic Considerations to Future Wireless Networks Bader Al-Manthari, Nidal Nasser, and Hossam Hassanein IEEE Transactions on.
The 2014 APSIPA ASC Conference December 9-12, 2014, Siem Reap, city of Angkor Wat, Cambodia Improved Cross-Layer Cooperative MAC Protocol for Wireless.
Wireless communications and mobile computing conference, p.p , July 2011.
ANALYSIS OF TRANSMIT ANTENNA SELECTION/MAXIMAL-RATIO COMBINING IN RAYLEIGH FADING CHANNELS IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 54, NO. 4, JULY.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
Fast and Reliable Route Discovery Protocol Considering Mobility in Multihop Cellular Networks Hyun-Ho Choi and Dong-Ho Cho Wireless Pervasive Computing,
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec ICU 2005:
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University CISS 2008 This work is supported in part.
V- BLAST : Speed and Ordering Madhup Khatiwada IEEE New Zealand Wireless Workshop 2004 (M.E. Student) 2 nd September, 2004 University of Canterbury Alan.
Spectrum Sensing In Cognitive Radio Networks
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University ICC 2008 This work is supported in part.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
Accurate WiFi Packet Delivery Rate Estimation and Applications Owais Khan and Lili Qiu. The University of Texas at Austin 1 Infocom 2016, San Francisco.
1 A Throughput Enhancement Handover Algorithm for WiMAX Network Architecture Hao-Ming Chang and Gwo-Jong Yu Graduate School of Mathematical Sciences, Aletheia.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
MobiCom’13 Jie Xiong and Kyle Jamieson University College London
Group Multicast Capacity in Large Scale Wireless Networks
Space-Time and Space-Frequency Coded Orthogonal Frequency Division Multiplexing Transmitter Diversity Techniques King F. Lee.
Combining Dirty-Paper Coding and Artificial Noise for Secrecy
Enhancing the capacity of Spectrum Sharing in Cognitive Radio Network
Distributed MIMO Patrick Maechler April 2, 2008.
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
Concept of Power Control in Cellular Communication Channels
Linglong Dai, Jintao Wang, Zhaocheng Wang and Jun Wang
Opportunistic Beam-forming with Limited Feedback
Optimal Combining of STBC and Spatial Multiplexing for MIMO-OFDM
Information Theoretical Analysis of Digital Watermarking
Presentation transcript:

Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December 11,2012

1. INTRODUCTION 2. MOTIVATION 3. LITERATURE REVIEW 4. RESEARCH GAP 5. OBJECTIVES 6. METHODOLOGY 7. WORK DONE SO FAR 8. RESULTS 9. REFERENCES CONTENTS

INTRODUCTION Wireless networks have become an essential part of our daily life. People rely heavily on wireless networks for transmission of important/private information. Security is a critical issue in wireless applications. Precise channel estimation allows authenticating the source and protecting the integrity of a message at the physical layer [4] without the need of a pre-shared secret key.

Continued…….. By doing security at physical layer we can reduce the burden on the authentication protocols at higher layer. Hypothesis testing [3] is one way by which we can develop an authentication scheme.

MOTIVATION Security is viewed as an independent feature addressed above the physical layer, and all widely used cryptographic protocols.. However, with the emergence of ad-hoc and decentralized networks, higher-layer techniques, such as encryption, are complex and difficult to implement. Therefore, there has been a considerable recent attention on studying the fundamental ability of the physical layer to provide secure wireless communications..

Literature Review Wiretap channels [5]

Continued…… Using the traditional terminology in the security literature, we consider three different agents: Alice, Bob and Eve. The authentication channel model [1]

Continued……. Authentication based on channel estimation [1]: Phase I:-Alice sends to Bob a training sequence, that we assume perfectly authenticated, for instance, by a cryptographic authentication at the application layer. ˆh(AB) = h(AB) + w(I)

Continued……. Phase II: Bob receives data packets. Authentication of these data packet is done in this phase. Now we apply hypothesis test H 0 : packet is from Alice, ˆh(t) = h(AB) + w(II)(t)

Continued……. H 1 : packet is not from Alice ˆh(t) = g(t) + w(II)(t) Now there may be two types of error can occur a. False alarm (FA) b.Missed detection (MD) Bob does not know the statistic of g. Therefore we apply GLRT.

Continued……. Flat Fading is caused by absorbers between the two antennae and is countered by antenna placement and transmit power level. The GLRT [7] consists in comparing the LLR with a threshold θ > 0. Ψ ≤ θ : decide for H0. Ψ > θ : decide for H1. We formulate the optimal attack strategy. The success probability of the attack is maximized by choosing ‘g’ to obtain the highest probability that the channel estimated by Bob lies in the sphere.

RESEARCH GAP Base paper scheme is only applicable for stationary legitimate transmitter. For mobile terminal it is not applicable. On the other hand, other attacks( such as jamming) are not considered.

OBJECTIVE Flat Fading is caused by absorbers between the two antennae and is countered by antenna placement and transmit power level. Our objective is to develop a scheme to authenticate the legitimate user in mobile environment. To evaluate the performance of the proposed method in MIMO/OFDM scenario.

Methodology We will start with the GLRT test. For this we will first derive LLR. Base paper result is only applicable for stationary Alice. Now we are assuming that Alice is moving with maximum velocity Va. To approach this we will take the help of [6] where authentication scheme is developed using NP Test.

Work done so far Literature Review of different Physical Layer Security methods. Derivation of LLR by applying GLRT assuming Alice is moving. Base paper has been simulated. Study of different attack strategies and derivation of single attack strategy.

Parameter Specification Uniform power delay profile is considered, i.e., λn = 1, n = 0, 1,...,N − 1. We focus first on the case where only one channel between h(AE) and h(EB) provides useful information to Eve, meaning that Eve performs an attack better than a simple guessing of ˆh (AB) only if she is sufficiently near to Alice or Bob. We impose ρ(AB) → 0, ρ(EB) → 0, ρ(AE) = ρ > 0.

Here we are considering OFDM system with N subcarriers. Here SNR(I)=15dB, SNR(II)=Infinity Results

Comparison between the developed authentication scheme and the outer bound. Here SNR(I)=15dB, SNR(II)=Infinity, N=5 Results

Here SNR(I)=15dB, SNR(II)=20 dB and Probability of false Alarm(Pfa)=10^-4. Results

To show the effectiveness of Eve’s Attack, we compare the average MD probability with the optimal strategy. Here SNR(I)=15dB, SNR(II)=Infinity and Probability of false Alarm(Pfa)=10^-4. Results

Continued…… Using the traditional terminology in the security literature, we consider three different agents: Alice, Bob and Eve. The authentication channel model [1]

SNR(II) =20 dB and Probability of false Alarm=10^-4. Results

Average MD probability versus Alpha in the MIMO scenario. Here N=2, SNR(II) =25 dB and \Rho=0.8 Results

References [1] P. Baracca, N. Laurenti, S. Tomasin, “Physical layer authentication over MIMO Fading Wiretap Channels,” IEEE Trans. Wireless Commun., vol. 11, no. 7, pp , July [2] L. Xiao, A. Reznik, W. Trappe, C. Ye, Y. Shah, L. J. Greenstein, and N. B. Mandayam, “PHY-authentication protocol for spoofing detection in wireless networks,” in Proc IEEE Global Telecommun. Conf.,pp. 1–6. [3] U. M. Maurer, “Authentication theory and hypothesis testing,” IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350–1356, July 2000.

[4] P. L. Yu, J. S. Baras, and B. M. Sadler, “Physical-layer authentication,” IEEE Trans. Inf. Forensics and Security, vol. 3, no. 1, pp. 38–51, Mar [5] A. Thangaraj, S. Dihidar, A. R. Calderbank, S. W. McLaughlin, and J. M. Merolla, “Applications of LDPC codes to the wiretap channels,”IEEE Trans. Inf. Theory, vol. 53, no. 8, pp. 2933–2945, Aug [6] L. Xiao, L. J. Greenstein, N. B. Mandayam, and W.Trappe, “A physical layer technique to enhance authentication for mobile terminals,” in Proc.2008 IEEE Int. Conf. on Commun. [7] Mourad Barkat,”Statistical Decision Theory,” in Signal Detection and Estimation, 2nd ed. London: Artech House Publishers, 2005.

THANK YOU