Boulat A. Bash Dennis Goeckel Don Towsley LPD Communication when the Warden Does Not Know When.

Slides:



Advertisements
Similar presentations
1 Binary Signal Detection In MATLAB weve worked some with AWGN noise and the concept of bit error probability. Lets describe how this is measured.
Advertisements

Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Chapter 10 Shannon’s Theorem. Shannon’s Theorems First theorem:H(S) ≤ L n (S n )/n < H(S) + 1/n where L n is the length of a certain code. Second theorem:
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Enhancing Secrecy With Channel Knowledge
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
Yan Huang, Jonathan Katz, David Evans University of Maryland, University of Virginia Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose.
Chapter 6 Information Theory
Desynchronization Attacks on Watermarks
The 1’st annual (?) workshop. 2 Communication under Channel Uncertainty: Oblivious channels Michael Langberg California Institute of Technology.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
The Byzantine Generals Strike Again Danny Dolev. Introduction We’ll build on the LSP presentation. Prove a necessary and sufficient condition on the network.
Variable-Length Codes: Huffman Codes
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
E&CE 418: Tutorial-6 Instructor: Prof. Xuemin (Sherman) Shen
Matched Filters By: Andy Wang.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Noise, Information Theory, and Entropy
ELE 745 – Digital Communications Xavier Fernando
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
Analysis of Iterative Decoding
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Dept. of EE, NDHU 1 Chapter Three Baseband Demodulation/Detection.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Channel Capacity
REVISED CONTEXTUAL LRT FOR VOICE ACTIVITY DETECTION Javier Ram’ırez, Jos’e C. Segura and J.M. G’orriz Dept. of Signal Theory Networking and Communications.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Baseband Demodulation/Detection
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
EE 6332, Spring, 2014 Wireless Communication Zhu Han Department of Electrical and Computer Engineering Class 11 Feb. 19 th, 2014.
Wireless Communication Elec 534 Set I September 9, 2007 Behnaam Aazhang.
Introduction to Coding Theory. p2. Outline [1] Introduction [2] Basic assumptions [3] Correcting and detecting error patterns [4] Information rate [5]
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 12.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
CHAPTER 5 SIGNAL SPACE ANALYSIS
The Price of Uncertainty in Communication Brendan Juba (Washington U., St. Louis) with Mark Braverman (Princeton)
1 Lecture 7 System Models Attributes of a man-made system. Concerns in the design of a distributed system Communication channels Entropy and mutual information.
Spectrum Sensing In Cognitive Radio Networks
Baseband Receiver Receiver Design: Demodulation Matched Filter Correlator Receiver Detection Max. Likelihood Detector Probability of Error.
Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi.
ELEC 303 – Random Signals Lecture 17 – Hypothesis testing 2 Dr. Farinaz Koushanfar ECE Dept., Rice University Nov 2, 2009.
Reliable Deniable Communication: Hiding Messages from Noise Pak Hou Che Joint Work with Sidharth Jaggi, Mayank Bakshi and Madhi Jafari Siavoshani Institute.
RELIABLE COMMUNICATION 1 IN THE PRESENCE OFLIMITEDADVERSARIES.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
1 Reliability-Based SD Decoding Not applicable to only graph-based codes May even help with some algebraic structure SD alternative to trellis decoding.
Performance of Digital Communications System
Error Detecting and Error Correcting Codes
- A Maximum Likelihood Approach Vinod Kumar Ramachandran ID:
Dennis Goeckel Electrical and Computer Engineering (ECE) University of Massachusetts at Amherst Fundamental Limits of Covert Communications Joint work.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION introduction A.J. Han Vinck May 10, 2003.
-SECRECY ENSURED TECHNOLOGYKEY DISTRIBUTUION CLASSICAL CRYPTOGRAPHY QUANTAM CRYPTOGRAPHY WORKING INTRODUCTION SECURITY CONCLUSION ADVANTAGESLIMITATIONS.
Lecture 1.31 Criteria for optimal reception of radio signals.
RELIABLE COMMUNICATION
Reliable Deniable Communication: Hiding Messages in Noise
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Diversity Lecture 7.
The Capacity of Wireless Networks
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Information-Theoretic Security
Presentation transcript:

Boulat A. Bash Dennis Goeckel Don Towsley LPD Communication when the Warden Does Not Know When

2 Introduction  How to conceal the presence of communication? Encryption insufficient (may even look suspicious) Need LPD=low probability of detection, a.k.a. “covert”, LPI  Why? “metadata” Communication not allowed Foment social unrest  What are the fundamental limits of LPD communication? Source: PraxisFilms

3 LPD communication work at ISIT  2012 (Cambridge) Bash, Goeckel, Towsley: “Square root law for communication with low probability of detection on AWGN channels”  Fundamental limit on LPD communication  2013 (Istanbul) Che, Bakshi, Jaggi “Reliable deniable communication: hiding messages in noise”  Secret codebook not needed in certain BSC scenarios Bash, Guha, Goeckel, Towsley “Quantum Noise Limited Optical Communication with Low Probability of Detection”  Quantum-theoretic limits on LPD communication  Related work: experimental demonstration of LPD scaling laws on optical channels (UMass/BBN collaboration)  2014 (Honolulu) Hou and Kramer “Effective Secrecy: Reliability, Confusion and Stealth” Bash, Goeckel, Towsley “LPD Communication when the Warden Does Not Know When” Kadhe, Jaggi, Bakshi, Sprintson ”Reliable, Deniable, and Hidable Communication over Multipath Networks”

4 Scenario (ISIT 2012)  Alice has an AWGN channel to Bob  Willie prohibits transmissions; monitors channel  Alice and Bob prepare by sharing a secret Clipart source: Artist Gerald_G, openclipart.org Alice can reliably transmit LPD bits to Bob in AWGN channel uses.

5 Scenario  Alice’s message is short w/r/t total time available  Alice and Bob secretly agree on transmission time Time period Willie has to monitor is a lot longer than message Has to extract from using Clipart source: Artist Gerald_G, openclipart.org Does this: contain + ? I’ll transmit at. Got it. Time

6 Main result  Alice can reliably transmit covert bits using a randomly selected -symbol slot, where total number of slots No additional secret required if,  Conversely, transmitting bits results either in detection by Willie or decoding errors slot 1slot 2      slot t A      slot T(n) total symbol periods Slot used by Alice and Bob

7 Outline  Introduction  Hypothesis testing preliminaries  Achievability  Converse (proof idea)  Conclusion

8 Hypothesis testing  Willie attempts to classify observations of Alice’s channel as either noise or signal corrupted by noise Binary hypothesis test  Willie’s probability of error  Alice desires Willie decides he saw Noise Signal+Noise quiet transmitting Alice is LPD criterion

9 Desirable by Willie Intuition behind Willie’s metric  Willie picks desired and uses a detector that maximizes  Alice can lower-bound by selecting appropriate covert symbol distribution Detector ROC 22 Desirable by Alice and

10 Outline  Introduction  Hypothesis testing preliminaries  Achievability  Converse (proof idea)  Conclusion

11 Achievability  Theorem: Alice can reliably transmit bits to Bob in a single slot while maintaining for arbitrary.  Proof steps: 1.Construction 2.Analysis of Willie’s detector (main challenge) 3.Analysis of Bob’s decoder slot 1slot 2      slot t A      slot T(n) total symbol periods Slot used by Alice and Bob

12 Construction  Alice and Bob’s secret random Gaussian codebook:  Used only once, to transmit in slot (also secret)  Willie knows construction, including,, But not the codebook itself 000…00 000…01 111…11 … MessagesCodewords symbols bits … … … …

13 Analysis of Willie’s detector  Standard method does not work (KL divergence upper-bound for is too loose)  LRT optimal, analyze likelihood ratio directly:          Slot used by Alice and Bob When Alice transmits:          slots When Alice is quiet: Willie’s observations Different only here! Same whether Alice transmits or not

14  Analyzing likelihood ratio:  Set  Then whether Alice transmits or not  Thus, for any choice of threshold, Analysis of Willie’s detector in distribution

15 Bob’s decoder  Bob attempts to ML-decode every slot Alice “transmits” all-zero codeword on unused slots  Probability of decoding error in slot (see ISIT ‘12):  Union bound over slots:  Since, Bob doesn’t even need to decode bits if,

16 Outline  Introduction  Hypothesis testing preliminaries  Achievability  Converse (proof idea)  Conclusion

17 Converse proof idea  Willie uses max-power detector:  Detects codewords with  Alice cannot transmit bits using (proof as in ISIT 2012)              slots Alice’s transmission

18 Conclusion  We presented a new scaling law for LPD communication Choice of transmission time is a cheap resource  Ongoing work We have experimentally demonstrated LPD scaling laws on optical channels (UMass/BBN collaboration) Extend to other channels “Shadow networks” Other resources for LPD communication

19 Thank you!

20 Converse: proof details  Let Willie use max-power detector:  We show it detects codewords with Proof that Alice cannot transmit bits using is identical to that in ISIT 2012

21 Converse: limiting false alarms  Willie observes slots, uses max-power detector:   To obtain desired, set                  slots When Alice is quiet:, where

22 Converse: detecting Alice’s transmissions  Willie observes slots, uses max-power detector:           slots When Alice transmits :

23 Converse : detecting Alice’s transmissions   When, When Alice transmits : One of slots or contains at least half ‘s power and are non-central chi-square r.v.’s          slots Alice’s codeword not here,