Electrical and Computer Engineering Dennis Goeckel University of Massachusetts Amherst This work is supported by the National Science Foundation under.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Foundations of Cryptography Lecture 7 Lecturer:Danny Harnik.
* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Trust relationships in sensor networks Ruben Torres October 2004.
Relaying in networks with multiple sources has new aspects: 1. Relaying messages to one destination increases interference to others 2. Relays can jointly.
Queuing Network Models for Delay Analysis of Multihop Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Causal Secrecy: An Informed Eavesdropper.
Secrecy Capacity Scaling of Large-Scale Cognitive Networks Yitao Chen 1, Jinbei Zhang 1, Xinbing Wang 1, Xiaohua Tian 1, Weijie Wu 1, Fan Fu 2, Chee Wei.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Information Theory for Secrecy and Control.
Enhancing Secrecy With Channel Knowledge
Physical Layer Security Made Fast and Channel-Independent Shyamnath Gollakota Dina Katabi.
Electrical and Computer Engineering Dennis Goeckel University of Massachusetts Amherst This work is supported by the National Science Foundation under.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
5/11/20151 Computer Networks COE 549 Random Access Tarek Sheltami KFUPM CCSE COE
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
Digital Data Transmission ECE 457 Spring Information Representation Communication systems convert information into a form suitable for transmission.
The Capacity of Wireless Ad Hoc Networks
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley MIT LIDS May 7, 2007 Joint work.
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
Revisting Random Key Pre-distribution Schemes for Wireless Sensor Network By Joengmin Hwang and Yongdae Kim, Computer Science and Engineering, University.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Noise, Information Theory, and Entropy
Mobile Ad hoc Networks COE 549 Delay and Capacity Tradeoffs II Tarek Sheltami KFUPM CCSE COE 8/6/20151.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley AISP Workshop May 2, 2007 Joint.
Fundamental Lower Bound for Node Buffer Size in Intermittently Connected Wireless Networks Yuanzhong Xu, Xinbing Wang Shanghai Jiao Tong University, China.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
EE360 PRESENTATION On “Mobility Increases the Capacity of Ad-hoc Wireless Networks” By Matthias Grossglauser, David Tse IEEE INFOCOM 2001 Chris Lee 02/07/2014.
Security in Computing Chapter 12, Cryptography Explained Part 7 Summary created by Kirk Scott 1.
1 Core-PC: A Class of Correlative Power Control Algorithms for Single Channel Mobile Ad Hoc Networks Jun Zhang and Brahim Bensaou The Hong Kong University.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching (Wide Area Networks)
The Secrecy of Compressed Sensing Measurements Yaron Rachlin & Dror Baron TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Lecture 2: Introduction to Cryptography
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
On the Topology of Wireless Sensor Networks Sen Yang, Xinbing Wang, Luoyi Fu Department of Electronic Engineering, Shanghai Jiao Tong University, China.
Computer Science 1 Using Directional Antennas to Prevent Wormhole Attacks Presented by: Juan Du Nov 16, 2005.
MAIN RESULT: Depending on path loss and the scaling of area relative to number of nodes, a novel hybrid scheme is required to achieve capacity, where multihop.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Packet Switching Datagram Approach Virtual Circuit Approach
Ivana Marić, Ron Dabora and Andrea Goldsmith
Hidden Terminal Decoding and Mesh Network Capacity
Using Secret Key to Foil an Eavesdropper
Pradeep Kyasanur Nitin H. Vaidya Presented by Chen, Chun-cheng
Information-Theoretic Security
Reza Sohrabi and Yingbo Hua
Presentation transcript:

Electrical and Computer Engineering Dennis Goeckel University of Massachusetts Amherst This work is supported by the National Science Foundation under Grants CNS , CCF , and ECCS Everlasting Security in Wireless Communications Networks The Chinese University of Hong Kong August 27,2014

2 Electrical and Computer Engineering Motivation Everlasting Secrecy: We are interested in keeping something secret forever. A challenge of cryptography (e.g. the VENONA project) is that recorded messages can be deciphered later: 1.If the primitive is shown not to be hard. 2.If significant computational advances are made 3.If the cryptographic scheme is broken. Information-theoretic secrecy

3 Electrical and Computer Engineering Information-theoretic secrecy [Shannon, 1949] Information is encoded in such a way that Eve gets no information about the message…if the scenario is right Advantages: 1.No computational assumptions on Eve. 2.If the transmission is securely made, it is secure forever.

4 Electrical and Computer Engineering Shannon and the one-time pad [C. Shannon, 1949]  Consider perfect secrecy over a noiseless wireline channel: Desire I(M,g K (M))= 0 Questions: 1.How long must K be for an N-bit message M? 2.How do you choose g K (M)? AliceBob Eve M g K (M) Pre-shared key K ? M

5 Electrical and Computer Engineering Shannon and the one-time pad [C. Shannon, 1948] Answers: 1.You need an N-bit key K for an N-bit message M. 2.g K (M) = M K AliceBob Eve M M K Pre-shared key K ? (M K) K = M Blah.

6 Electrical and Computer Engineering The Alice-Bob-Eve Scenario in Wireless AliceBob Eve Building But the channels might be noisy…it might be Eve in the parking lot listening… …in which case Eve’s channel is worse than Bob’s. Can this help get information-theoretic secrecy?

7 Electrical and Computer Engineering The Wiretap Channel [Wyner, 1975; Cheong and Hellman, 1978] R AB : Capacity of channel from Alice to Bob R AE : Capacity of channel from Alice to Eve R AB > R AE AliceBob Eve Building R = log 2 (1 + SNR AB ) – log 2 (1 + SNR AE ) Gaussian channels: Positive rate “if Bob’s channel is better”, and Eve gets nothing. IT Security Basics PHY-layer Solutions Using the Network Challenges

8 Electrical and Computer Engineering The Alice-Bob-Eve Scenario in Wireless AliceBob Eve Building But it might not be Eve in the parking lot listening, rather… …it might be Eve in the building! Important Challenge: the “near Eve” problem…

9 Electrical and Computer Engineering The Alice-Bob-Eve Scenario in Wireless AliceBob Building …and you very likely will not know where she is. Many would argue that we have traded a long-term computational risk (cryptography) for a short-term scenario (information-theoretic secrecy) risk…no thank you! Eve

10 Electrical and Computer Engineering Outline 1.Information Theoretic security basics 2.Potential Physical-Layer Solutions (with Azadeh Sheikholeslami, Hossein Pishro-Nik) 3. Exploiting the Network (with Sudarshan Vasudevan, Cagatay Capar, Don Towsley) 4. Current and Future Challenges

11 Electrical and Computer Engineering Outline 1.Information Theoretic security basics 2.Potential Physical-Layer Solutions (with Azadeh Sheikholeslami, Hossein Pishro-Nik) 3. Exploiting the Network (with Sudarshan Vasudevan, Cagatay Capar, Don Towsley) 4. Current and Future Challenges Recall Goal: Keep Eve from recording a signal from which she can later extract the information.

12 Electrical and Computer Engineering Outline 1.Information Theoretic security basics 2.Potential Physical-Layer Solutions (with Azadeh Sheikholeslami, Hossein Pishro-Nik) 3. Exploiting the Network (with Sudarshan Vasudevan, Cagatay Capar, Don Towsley) 4. Current and Future Challenges Recall Goal: Keep Eve from recording a signal from which she can later extract the information.

13 Electrical and Computer Engineering Cachin and Maurer introduced the “bounded memory model” to achieve everlasting secrecy [Cauchin and Maurer, 1997]. An eavesdropper with memory < M cannot store enough to eventually break the cipher. 4/12 Attacking the Hardware I: Bounded Memory Model [From “blog.dshr.org”] 1. The density of memories grows quickly (Moore’s Law) However, it is hard to pick a memory size that Eve cannot use beyond: 2. Memories can be stacked arbitrarily subject only to (very large) space limitations. IT Security Basics PHY-layer Solutions Using the Network Challenges

14 Electrical and Computer Engineering Bounded Conversion Model 1. In the combative sender-eavesdropper game, front-end dynamic range is a critical aspect of the receiver. 2. A/D Technology progresses very slowly. 3. High-end A/D’s are already stacked to the limit of the jitter. Perhaps Cachin and Maurer attacked the wrong part of the receiver: Idea: AliceBob Eve 1. IT security requires a channe l advantage. 2.Establish cryptographic security (e.g. Diffie-Hellman) 3.Use a short-term cryptographic to establish the channel advantag e. Analog “Front-End” A/D Digital “Back-End” Eve’s Receiver IT Security Basics PHY-layer Solutions Using the Network Challenges

15 Electrical and Computer Engineering 5/12 System model and approach: 1.Alice and Bob pre-share an “emphemeral” cryptographic key k to choose g(.). Note: Key will be handed to Eve after transmission. k IT Security Basics PHY-layer Solutions Using the Network Challenges

16 Electrical and Computer Engineering 5/12 System model and approach: 1.Alice and Bob pre-share an “emphemeral” cryptographic key k to choose g(.). Note: Key will be handed to Eve after transmission. 2.A/D is a non-linear element. Non-commutativity of non-linear elements: potential information-theoretic security. k IT Security Basics PHY-layer Solutions Using the Network Challenges

17 Electrical and Computer Engineering 5/12 System model and approach: 1.Alice and Bob pre-share an “emphemeral” cryptographic key k to choose g(.). Note: Key will be handed to Eve after transmission. 2.A/D is a non-linear element. Non-commutativity of non-linear elements: potential information-theoretic security. k 3.Secrecy rate is a shaping gain: R s =E g [h(X) – h(g(X))] h(X): differential entropy …but, unlike traditional “shaping gains”, gain can be huge. IT Security Basics PHY-layer Solutions Using the Network Challenges

18 Electrical and Computer Engineering 6/12 Example: Rapid power modulation for secrecy: Idea: Key used to rapidly power modulate transmitter. Bob’s receiver gain control can follow, while Eve’s struggles. IT Security Basics PHY-layer Solutions Using the Network Challenges

19 Electrical and Computer Engineering 6/12 Rapid power modulation for secrecy: IT Security Basics PHY-layer Solutions Using the Network Challenges

20 Electrical and Computer Engineering 6/12 Rapid power modulation for secrecy: IT Security Basics PHY-layer Solutions Using the Network Challenges

21 Electrical and Computer Engineering 6/12 Rapid power modulation for secrecy: Bob’s gain control is correct: input well-matched to A/D span. IT Security Basics PHY-layer Solutions Using the Network Challenges

22 Electrical and Computer Engineering 7/12 Rapid power modulation for secrecy: 2. It is easy to show that the optimal strategy (for Eve) is to pick a single gain G. 1.Alice sets her parameters to maximize R s, whereas Eve tries to find a gain G that minimizes the secrecy rate R s given Alice’s choice: R s =max S min G R s (S, G) IT Security Basics PHY-layer Solutions Using the Network Challenges

23 Electrical and Computer Engineering Large gain Effect of A/D on the signal:  Clipping (due to overflow) 8/12 Rapid power modulation for secrecy: IT Security Basics PHY-layer Solutions Using the Network Challenges

24 Electrical and Computer Engineering Small gain Effect of A/D on the signal:  Clipping (due to overflow)  Quantization noise (uniformly distributed ) 8/12 Rapid power modulation for secrecy: IT Security Basics PHY-layer Solutions Using the Network Challenges

25 Electrical and Computer Engineering Effect of A/D on the signal:  Clipping (due to overflow)  Quantization noise (uniformly distributed ) Trade-off between choosing a large gain and a small gain:  Eve needs to compromise between more A/D overflows or less resolution. 8/12 Rapid power modulation for secrecy: IT Security Basics PHY-layer Solutions Using the Network Challenges

26 Electrical and Computer Engineering (a) Public Discussion (b) Power modulation (Although they are not really competing techniques. Power modulation approach could be used under public discussion.) What if Eve picks up the transmitter? IT Security Basics PHY-layer Solutions Using the Network Challenges

27 Electrical and Computer Engineering Secrecy rate vs. SNR at Bob, Eve has perfect access to the signal 10/12 Noisy channel to Bob, noiseless channel to Eve. AliceBob Eve IT Security Basics PHY-layer Solutions Using the Network Challenges

28 Electrical and Computer Engineering Other approaches: 1.Artificial intersymbol interference (ISI) [ISIT 2013]: Introduce intentional ISI at the transmitter, key gives Bob an advantage in equalization. 2.Artificial jamming [Asilomar 2014]: Key is used to add a jamming signal, which Bob can pre-cancel at the receiver – unlike seemingly similar approaches in literature, cryptographic key is handed to Eve after transmission. IT Security Basics PHY-layer Solutions Using the Network Challenges Needs some jamming to confuse Eve Need some signal power for Bob

29 Electrical and Computer Engineering IT Security Basics PHY-layer Solutions Using the Network Challenges Challenges for Everlasting Secrecy (Alice-Bob-Eve): 1.Cryptography: Computational assumptions on eavesdropper. 2.Information-theoretic security: Scenario assumptions on eavesdropper. 3.Our approach: Assumptions on current conversion capabilities of eavesdropper.

30 Electrical and Computer Engineering Outline 1. Information Theoretic security basics 2. Potential Physical-Layer Solutions 3. Exploiting the Network 4. Current and Future Challenges

31 Electrical and Computer Engineering 1.How much secret info can be shared by a network of wireless nodes in the presence of eavesdropper nodes? [Gupta/Kumar et al] The Network Scale: AliceBob Eve So far we have considered (perhaps not so successfully): But perhaps we should consider: 2.… and how many eavesdroppers can the network tolerate? Questions: IT Security Basics PHY-layer Solutions Using the Network Challenges

32 Electrical and Computer Engineering Gupta-Kumar: n nodes each can share bits per second. Want to achieve this throughput securely, in the presence of m eavesdroppers of unknown location. n good guys (matched into pairs) m bad guys. Problem: Secrecy Sca ling IT Security Basics PHY-layer Solutions Using the Network Challenges

33 Electrical and Computer Engineering Network (random extended network): Nodes are placed in the interval [0, n]. Legitimate nodes randomly placed: Poisson with unit density (n good guys on average) Eavesdroppers Poisson with e (n) ( m(n) = e (n) n bad guys on average.) n nodes matched into source- destination pairs uniformly at random. 1-D Networks (worst-case topology) S1S1 D1D1 D2D2 S2S2 n randomly located nodes -> how much secret information in the presence of m(n) eavesdroppers ? IT Security Basics PHY-layer Solutions Using the Network Challenges

34 Electrical and Computer Engineering A single eavesdropper of known location -> 1-D disconnected (zero secret bits)! Why? For any node to Eve’s left, Eve is closer (has larger SINR) than the good nodes located to Eve’s right. What to do? Answer: Nodes help each other to achieve secrecy -> Cooperation. × A EB B: Weaker signalE: Stronger signal Cooperative Jamming: EB B: Weaker signal, weaker noise E: Stronger signal, stronger noise J A 1-D Networks (worst-case topology) SD Eve IT Security Basics PHY-layer Solutions Using the Network Challenges

35 Electrical and Computer Engineering So, the idea to connect each S-D pair through a sequence of many single-cell hops + one multi-hop jump until reaching D. Routing Algorithm: ××× But what if you don’t know where the eavesdroppers are? Jamming works if you know where the eavesdroppers are. IT Security Basics PHY-layer Solutions Using the Network Challenges

36 Electrical and Computer Engineering ××× Unknown Eavesdropper Locations: I know how to protect the message if eavesdroppers are spaced far apart. But this time eavesdroppers can be anywhere. ×××××× kth cell (k+10)th cell IT Security Basics PHY-layer Solutions Using the Network Challenges

37 Electrical and Computer Engineering S D x: the b-bit secret message. S generates t-1 b-bit packets w 1, w 2, …, w t-1 randomly, sets w t to be such that x = w 1 = w 2 = w 3 = w 4 = Solution comes with secret sharing at the source random Anyone who has all t packets has the message. Anyone who misses at least one packet has no information about the message. For one message, S sends t packets. The packets are sent in separate transmissions. Idea: Ensure an eavesdropper anywhere in the network misses at least one packet. IT Security Basics PHY-layer Solutions Using the Network Challenges

38 Electrical and Computer Engineering ×××××× Divide the network into regions: Coloring the network! Unknown Eavesdropper Location s: IT Security Basics PHY-layer Solutions Using the Network Challenges

39 Electrical and Computer Engineering Secrecy Analysis: The only potentially unsecure places: start or the end of a route. Near-eavesdropper n/logn eavesdroppers Standard Scheduling applied: cells take turns in transmissions: throughput per node pair (standard). Throughput Analysis: ××× S IT Security Basics PHY-layer Solutions Using the Network Challenges

40 Electrical and Computer Engineering (Insecure) Throughput: bits per second (per- node throughput) [Gupta-Kumar, 2001] bits per second (per-node throughput [Franceschetti et al, 2007] Multi-hop route connecting source- destination pairs. Two-Dimensional Networks (Review) If eavesdropper locations are known: Can route around the “holes” as long as m = o(n/logn) [Koyluoglu et al, 2011] Also: Securing each hop individually is sufficient to secure the end-to-end route [Koyluoglu et al, 2011] IT Security Basics PHY-layer Solutions Using the Network Challenges

41 Electrical and Computer Engineering Unknown eavesdropper location. What to do? First answer: Try Cooperative Jamming. At each hop, some nodes transmit artificial noise to protect the message from eavesdroppers around. BJ A Can tolerate m(n) = log n eavesdroppers (only). Is this the cost of unknown eavesdropper positions? Two-Dimensional Networks [Vasudevan et al, 2011] IT Security Basics PHY-layer Solutions Using the Network Challenges

42 Electrical and Computer Engineering x = w 1 = w 2 = w 3 = w 4 = Two-Dimensional Networks (Secret Sharing) random An eavesdropper cannot be close to many paths at once… Except when close to the source or the destination. Can tolerate n/logn eavesdroppers. IT Security Basics PHY-layer Solutions Using the Network Challenges

43 Electrical and Computer Engineering What about those near eavedroppers? Problem: near eavesdropper (SNR gap). We know how to address that: Two-way scheme ( evens out the SNR gap ) Remember, the problem here was: Near eavesdropper of unknown location. IT Security Basics PHY-layer Solutions Using the Network Challenges

44 Electrical and Computer Engineering The Trick: A Toy Example An incoming connection can be very useful. This simple trick has an important implication for wireless secrecy. Two-way helps address the near eavesdropper problem 1) d generates a random message k and sends it to s. 2) s replies with (k is used as a one-time pad.) 3) d extracts x from c, k. e misses k, cannot decode x. Two nodes + one eavesdropper e catches whatever s says. An incoming secure edge is sufficient for secrecy. IT Security Basics PHY-layer Solutions Using the Network Challenges

45 Electrical and Computer Engineering Two-Dimensional Networks S again generates four packets w1, w2, w3, w4. But this time, does the two-way scheme with four relays to deliver these packets. Any Eve here misses k2 -> misses w2 Draining Phase: How we initiate at the source Routing Algorithm: Draining, routing, delivery No Eve can be in between for all four r-s pairs. IT Security Basics PHY-layer Solutions Using the Network Challenges

46 Electrical and Computer Engineering Routing Phase: Delivery Phase: Carry packets on distant paths. Come from four directions -> no near eavesdropper can be in between. IT Security Basics PHY-layer Solutions Using the Network Challenges

47 Electrical and Computer Engineering Two-Dimensional Networks Any Eve here misses k2 -> misses w2 Come from four directions. No Eve can be in between for all four r-s pairs. Result: Network can tolerate any number of eavesdroppers of arbitrary location at the Gupta-Kumar per-pair throughput. Note: Importantly, the same technique can be used in practical networks that are: 1.sufficiently dense 2.add infrastructure IT Security Basics PHY-layer Solutions Using the Network Challenges

48 Electrical and Computer Engineering Summary 1.Information-theoretic security can provide everlasting security – if it can be secured during tranmission. 2.Exploit the non-commutativity of nonlinear operators to provide a physical-layer approach for disadvantaged environments, but no scheme is completely satisfying. 3.Perhaps the key is to exploit the network, and two-way communications. Biggest question: Is information-theoretic security in wireless just a waste of (mostly academic) resources? IT Security Basics PHY-layer Solutions Using the Network Challenges