Physical Layer Security

Slides:



Advertisements
Similar presentations
TRAINING SERVICES NIGTEL-CS TRAINING SERVICE Mobile Telecommunications in Africa especially Nigeria has recorded rapid growth and expansion in the.
Advertisements

Interference Cancellation in Two-Path Successive Relay System with Network Coding Chunbo Luo, Dr. Yu Gong & Prof. Fuchun Zheng School of Systems Engineering.
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
Geolocation databases for spectrum sharing : ECC findings and studies EC DG CONNECT Workshop, 20 March 2015 Bruno Espinosa, Deputy Director, ECO.
1 Ultrawideband Contents Introduction Why Ultrawideband UWB Specifications Why is UWB unique Data Rates over range How it works UWB Characteristics Advantages.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
1 ISIS-IPHOBAC SUMMER SCHOOL, May 17-18, 2007, Budapest, Hungary "Broadband Architectures and Functions" Photonic microwave signal processing Jianping.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) October.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Symmetric Key Management Books Development Plan Daniel Fischer (ESA) Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
Mobile and Wireless Communication Technologies & Techniques
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/SPARTA (a Parsons Company) April.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/PARSONS November 2014 BSI, London.
Communications Systems. 1Analogue modulation: time domain (waveforms), frequency domain (spectra), amplitude modulation (am), frequency modulation (fm),
Orthogonal Frequency Division Multiplexing
1 SecWG New Business Discussions CCSDS CNES, Toulouse FR Howard Weiss NASA/JPL/SPARTA November 2004.
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Building a contactless university examination system using NFC Speaker : Chih-Ching Chen Advisor : Dr. Ho-Ting Wu 2013/12/2 1.
Security WG: Report of the Spring 2012 Meeting European Space Operations Centre Darmstadt, Germany 19 April, 2012 Howard Weiss NASA/JPL/SPARTA
Communications security
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
SDLS Protocol Green Book initiation Ignacio Aguilar Sanchez (ESA) CCSDS Spring Meeting 2010 | Portsmouth, VA.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
0 CCSDS Systems Engineering Area: Security Working Group Howard Weiss NASA/JPL/Cobham (Parsons) October 2011.
DATA AND COMPUTER COMMUNICATIONS Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 9 – Spread Spectrum.
ERM/MTS STF proposal on formal Phy measurement framework Friedbert Berens Vice Chair ERM TGUWB Presentation to ERM, July 2010.
KM SDLS Extended Procedures YB
The CCSDS Security WG is chartered to:
Security WG: Status Briefing
Device Security in Cognitive Radio
CCSDS physical layer security option
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Review of Related Literature
Introduction to Cognitive radios Part two
CCSDS Security WG - I. Aguilar, D. Fischer CCSDS Fall 2012 Meeting, Cleveland, USA 15/10/2012.
CCSDS Systems Engineering Area: Security Working Group
Brainstorming for Future WWG Activities
Joint Meeting of the CCSDS and the OMG-SDTF
Analog and Digital Modulation Techniques
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
CCSDS Physical Layer Security White Paper
COMPUTER NETWORKS and INTERNETS
Security WG: Report of the Fall 2013 Meeting
Introduction to Information Security
Network Security & Cryptography
Information Technology - Information Networks
Combining Dirty-Paper Coding and Artificial Noise for Secrecy
Outline What is Literature Review? Purpose of Literature Review
SDLS Protocol Green Book initiation
Status On Current DFS CEPT/ECC Civil/Military Meeting, November 2016, Prague Thomas Weber, ECO, Spectrum Management
PERFORMANCE ANALYSIS OF SPECTRUM SENSING USING COGNITIVE RADIO
Ultrawideband Contents
Distributed MIMO Patrick Maechler April 2, 2008.
Qishi Wu University of Memphis
Security in Network Communications
Cryptography and Network Security
Digital Communication Chapter 1: Introduction
Using Secret Key to Foil an Eavesdropper
CS 8532: Advanced Software Engineering
The Literature Review Dr Areefa Albahri.
(Digital Modulation Basics)
Security in SDR & cognitive radio
Data Transmission And Digital Communication
Security Ad-Hoc Report Draft
Wiley – IEEE Press Best Practices for Wiley-IEEE Press Series
Chenhui Zheng/Communication Laboratory
Presentation transcript:

Physical Layer Security 05/08/2017 IGNACIO AGUILAR SANCHEZ, ESA CHARLES SHEEHE, NASA

Outline Introduction Overview of secure channels COMSEC TRANSEC Non-crypto approaches Main physical layer security concepts Cryptographic spread spectrum Wiretap channel RF fingerprinting Prospects for CCSDS White, then Green Book Blue Books? Preliminary conclusions and follow-on Towards a White paper

Introduction (1/2) Purpose Scope Initiate CCSDS discussion and possibly future work on physical layer security concepts, techniques and related technologies as a future component of space mission security engineering portfolio. Scope Today a short presentation introducing the subject and its most important elements.

Introduction (2/2) Motivation CCSDS has already tackled link and network layers on its security engineering effort (e.g. SDLS). Certain threats can only be mitigated at physical layer (e.g. denial of service by deliberate interference, signal interception). But more interestingly physical layer has been rediscovered to secure communication channels with security services traditionally assigned to upper (data) layers (e.g. authentication, confidentiality) and with a promise of information-theoretic strong security (vs. computationally-strong) without a key management burden. Really?

Overview of secure channels

Cryptographic spread spectrum

Wiretap channel approaches

RF fingerprinting

Prospects for CCSDS White Book followed by Green Book The subject is broad and complex, touching disciplines covered by several CCSDS WGs…but could provide useful complements and/or novel solutions to engineer security on space missions Research hot topic for wireless communications security with strong interest by both civilian and governmental communities Deeper understanding of the subject as well as relevant research results, expected benefits, future mission requirements, etc. before deciding on any potential standard Joint SEC, RFM and S&CC task? Cautious but thorough approach!

Towards a white paper

Physical Layer Security White Paper Outline INTRODUCTION INTRODUCTORY SUBSECTIONS REFERENCES OVERVIEW OF SECURE CHANNELS SECURE CHANNELS COMMUNICATIONS SECURITY (COMSEC) TRANSMISSION SECURITY (TRANSEC) NON-CRYPTOGRAHIC APPROACHES MAIN PHYSICAL LAYER SECURITY CONCEPTS CRYPTOGRAPHIC SPREAD SPECTRUM SPREAD SPECTRUM PSEUDORANDOM SEQUENCES ISSUES WIRETAP CHANNEL APPROACHES THE WIRETAP CHANNEL INJECTION OF ARTIFICIAL NOISE KEY DERIVATION CODING FOR SECRECY CHANNEL UNIQUENESS TRANSMITTER UNIQUENESS - RF FINGERPRINTING THE RADIO IN THE FINGERPRINT THE REMOVAL OF INPUT FROM THE OUTPUT COMPARISONS CONCLUSION PROSPECTS FOR CCSDS EXPECTED BENEFITS REQUIREMENTS FOR PROSPECTIVE MISSIONS RELATIONSHIP WITH EXISTING STANDARDS IDENTIFIED DEFICIENCIES, FLAWS, AND LIMITATIONS IN EXISTING STANDARDS GREEN BOOK ON PHYSICAL LAYER SECURITY BLUE BOOKS OVERVIEW OPTICAL LINK ENCRYPTION AND KEY DERIVATION CONCLUSION AND RECOMMENDATIONS

Physical Layer Security paper process Develop Physical Layer paper outline Public references for each section Expand each section Review of Physical Security Layer paper by Security Working Group Refine paper structure and content RF Modulation Working Group buy in and provide feed back on Physical Security Layer paper Refine paper Publish Physical Layer Security paper

Physical Layer Security questions / notes Introduce the schematic of RF fingerprinting identification process (transmitter+wireless channel+receiver).

Some good readings C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, April 1949. A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1367, October 1975. “Physical-Layer Security From Information Theory to Security Engineering”, M. Bloch and J. Barros, Cambridge University Press, 2011. “Algebraic Shift Register Sequences”, M. Goresky and A. Klapper, Cambridge University Press, 2012. “Information Theoretic Security”, Yingbian Liang, H. Vincent Poor and Shlomo Shamai (Shitz), Foundations and Trends in Communications and Information Theory, Vol. 5 Issue 4-5, 2008. ….. To be completed!