Xiaohua (Edward) Li1 and E. Paul Ratazzi2

Slides:



Advertisements
Similar presentations
Quantum Cryptography Post Tenebras Lux!
Advertisements

PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Causal Secrecy: An Informed Eavesdropper.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Information Theory for Secrecy and Control.
Enhancing Secrecy With Channel Knowledge
Physical Layer Security Made Fast and Channel-Independent Shyamnath Gollakota Dina Katabi.
Comparison of different MIMO-OFDM signal detectors for LTE
1 Cooperative Transmissions in Wireless Sensor Networks with Imperfect Synchronization Xiaohua (Edward) Li, Mo Chen and Wenyu Liu Department of Electrical.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Optimization of pilot Locations in Adaptive M-PSK Modulation in a Rayleigh Fading Channel Khaled Almustafa Information System Prince Sultan University.
Introduction to Cryptography and Security Mechanisms: Unit 5 Theoretical v Practical Security Dr Keith Martin McCrea
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
#7 1 Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science University of Kansas 2335 Irving Hill Dr. Lawrence,
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Joint work with Miguel Rodrigues, Munnunjahan Ara, Vinay Prabhu and João Xavier Filter Design with Secrecy Constraints Hugo Reboredo Instituto de Telecomunicações.
2002 MURI Minisymposium Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments 2002 MURI Minisymposium Ameesh Pandya Prof.
Muhammad Imadur Rahman1, Klaus Witrisal2,
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
A FREQUENCY HOPPING SPREAD SPECTRUM TRANSMISSION SCHEME FOR UNCOORDINATED COGNITIVE RADIOS Xiaohua (Edward) Li and Juite Hwu Department of Electrical and.
Cooperative Diversity Scheme Based on MIMO-OFDM in Small Cell Network Dong-Hyun Ha Sejong University.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
(Semi) Blind Channel Estimation & Data Recovery in OFDM Presented by: Ahmed Abdul Quadeer Electrical Engineering Department 2 nd Graduates Seminar Day.
Secure Communication for Distributed Systems Paul Cuff Electrical Engineering Princeton University.
1 Energy Efficiency of MIMO Transmissions in Wireless Sensor Networks with Diversity and Multiplexing Gains Wenyu Liu, Xiaohua (Edward) Li and Mo Chen.
The Secrecy of Compressed Sensing Measurements Yaron Rachlin & Dror Baron TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
1 Power Efficient Wireless Sensor Networks with Distributed Transmission-Induced Space Spreading Xiaohua (Edward) Li and N. Eva Wu Department of Electrical.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Resilient Network Coding in the Presence of Eavesdropping Byzantine Adversaries Michael Langberg Sidharth Jaggi Open University of Israel ISIT 2007 Tsinghua.
Ali Al-Saihati ID# Ghassan Linjawi
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Collaborative Communications in Wireless Networks Without Perfect Synchronization Xiaohua(Edward) Li Assistant Professor Department of Electrical and Computer.
EE359 – Lecture 15 Outline Introduction to MIMO Communications MIMO Channel Decomposition MIMO Channel Capacity MIMO Beamforming Diversity/Multiplexing.
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
ECE External Research Board Meeting Wireless Network and Communications Tan F. Wong Wireless Information and Networking Group
Introduction to Quantum Key Distribution
Wireless Information Networking Group Cooperative Diversity Techniques for Wireless Networks Arun ‘Nayagam Wireless Information Networking Group (WING)
1 Blind Channel Identification and Equalization in Dense Wireless Sensor Networks with Distributed Transmissions Xiaohua (Edward) Li Department of Electrical.
CRYPTOGRAPHY & NETWORK SECURITY Introduction and Basic Concepts Eng. Wafaa Kanakri Computer Engineering Umm Al-Qura University.
Overview of Cryptography & Its Applications
Códigos y Criptografía Francisco Rodríguez Henríquez Códigos y Criptografía Francisco Rodríguez Henríquez CINVESTAV
TI Cellular Mobile Communication Systems Lecture 4 Engr. Shahryar Saleem Assistant Professor Department of Telecom Engineering University of Engineering.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
University of Houston Cullen College of Engineering Electrical & Computer Engineering Capacity Scaling in MIMO Wireless System Under Correlated Fading.
Doppler Spread Estimation in Frequency Selective Rayleigh Channels for OFDM Systems Athanasios Doukas, Grigorios Kalivas University of Patras Department.
TCP-Cognizant Adaptive Forward Error Correction in Wireless Networks
Channel Independent Viterbi Algorithm (CIVA) for Blind Sequence Detection with Near MLSE Performance Xiaohua(Edward) Li State Univ. of New York at Binghamton.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Channel-Independent Viterbi Algorithm (CIVA) for DNA Sequencing
Presented by Abhijit Mondal Haritabh Singh Suman Mondal
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University CISS 2008 This work is supported in part.
1 Channel Equalization for STBC- Encoded Cooperative Transmissions with Asynchronous Transmitters Xiaohua (Edward) Li, Fan Ng, Juite Hwu, Mo Chen Department.
Quantum Cryptography Antonio Acín
Zahoor Ahmed J.P.Cances V.Meghdadi Cryptographic Spread Spectrum Relay Communication NGMAST 2008.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
INCS 741: Cryptography Overview and Basic Concepts.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Xiaohua (Edward) Li and Juite Hwu
Combining Dirty-Paper Coding and Artificial Noise for Secrecy
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Distributed MIMO Patrick Maechler April 2, 2008.
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
Channel Spoofer: Defeating Channel Variability and Unpredictability
Using Secret Key to Foil an Eavesdropper
Information Sciences and Systems Lab
Presentation transcript:

MIMO Transmissions with Information Theoretic Secrecy for Secret-Key Agreement in Wireless Networks Xiaohua (Edward) Li1 and E. Paul Ratazzi2 1Department of Electrical and Computer Engineering State University of New York at Binghamton xli@binghamton.edu, http://ucesp.ws.binghamton.edu/~xli 2Air Force Research Lab, AFRL/IFGB, paul.ratazzi@afrl.af.mil MILCOM'2005

Contents Introduction Secure MIMO transmission scheme Transmission weights design Transmission secrecy Simulations Conclusions MILCOM'2005

1. Introduction Secure wireless transmission: necessary PHY security techniques for wireless information assurance Wireless transmissions have no boundary, susceptible to listening/analyzing, location, jamming Wireless nodes have severe energy and bandwidth constraints  “light” techniques Unreliable link and dynamic network topology MILCOM'2005

Secure Wireless Transmissions Traditional secure transmission design Data encryption, spread spectrum, etc New idea: use antenna array diversity and array redundancy A completely different approach of secure (LPI) waveform design MILCOM'2005

Significance to Cryptography Provable (information-theoretic) secrecy Inherently secure transmission, no encryption keys involved Comparable to quantum cryptography Provide PHY-layer LPI, and assist higher layer data encryption PHY-layer assisted secret key agreement MILCOM'2005

Secret-Key Agreement Classic Shannon model Alice & Bob try to exchange encryption keys for encrypted data transmission Eve can acquire all (and identical) messages received by Alice or Bob Perfect secrecy impractical under Shannon model Computational secrecy achievable MILCOM'2005

PHY-layer Transmission Secrecy Model Information theoretic secrecy realizable with model different than Shannon’s Eve’s channels, and thus received signals, are different from Alice’s or Bob’s A reality in quantum communication, and wireless transmissions MILCOM'2005

Information-Theoretic Secrecy Wyner’s wire-tap channel: secret capacity Maurer’s common information concept High secret channel capacity requires Eve’s channel being noisier  not practical enough MILCOM'2005

2. Secure MIMO transmission scheme Can we guarantee a large or in practice? Possible: randomized MIMO transmission Basic idea: Use redundancy of antenna array Exploit the limit of blind deconvolution Eve can not estimate channel/symbol blindly MILCOM'2005

Transmission Scheme Alice: antenna array (secure, public, pilot) Does not send training signals Bob: estimate symbols, no channel knowledge required MILCOM'2005

Signal Model and Assumptions Alice, Bob & Eve do not know channels. Alice estimate H by reciprocity Bob need not know channel. Eve depends on blind estimation. MILCOM'2005

MIMO Transmission Procedure Alice select transmit antenna weights so that Bob receives signal By estimating received signal power, Bob can detect signals Key points: No channel information required for Bob, no training required  no training available to Eve Redundancy in selecting weights MILCOM'2005

3. Transmission Weights Design Existing array transmission schemes are susceptible to Eve’s blind deconvolution attack? Eve can easily estimate by blind deconvolution if with optimal transmit beamforming MILCOM'2005

Select Weights with Randomization W1(n): Redundancy in transmitting weights Procedure: MILCOM'2005

4. Transmission Secrecy Eve’s received signal becomes which has distribution Objective: Eve can not estimate channel Hu from xe(n), which relies on Assumption that Eve & Bob’s channels are sufficiently different  wireless channels fade independently when separated a fractional of wavelength Unknown to Eve: MILCOM'2005

Indeterminacy of Blind Channel Estimation Proposition: MILCOM'2005

Indeterminacy of Blind Symbol Estimation Proposition: Result: Eve’s error rate: high Bob’s error rate: low (identical to optimal MIMO eigen-beamforming) Cost paid: higher transmission power MILCOM'2005

Transmission secrecy Weights are selected randomly and unknown to Eve, blind deconvolution is made impossible Weights are selected by Alice, no need to tell Bob  equivalently one-time pad Information theory guarantees high and positive secret channel capacity  provable (information theoretic) secrecy MILCOM'2005

Eve’s Exhaustive Search Attack Eve may exhaustively try all possible channels (both ). The complexity can be at least , according to quantization level Q Low quantization level reduces complexity, but increases symbol estimation error  still makes high positive secret channel capacity possible Example, MILCOM'2005

5. Simulations BER of the proposed transmission scheme J=6. K=4. QPSK. MILCOM'2005

Secret channel capacity with the simulated BER MILCOM'2005

Conclusions Proposed a randomized MIMO transmission scheme Use array redundancy and channel diversity for transmission security Enhance transmission LPI in the PHY-layer by increasing the adversary’s receiving error Proof of secrecy with weight randomization and limit of blind deconvolution MILCOM'2005