1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.

Slides:



Advertisements
Similar presentations
Interference Cancellation in Two-Path Successive Relay System with Network Coding Chunbo Luo, Dr. Yu Gong & Prof. Fuchun Zheng School of Systems Engineering.
Advertisements

VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
1. INTRODUCTION In order to transmit digital information over * bandpass channels, we have to transfer the information to a carrier wave of.appropriate.
Z-MAC: a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min Dept. of Computer Science, North Carolina State.
The Impact of Channel Estimation Errors on Space-Time Block Codes Presentation for Virginia Tech Symposium on Wireless Personal Communications M. C. Valenti.
AALTO UNIVERSITY School of Science and Technology Wang Wei
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Enhancing Secrecy With Channel Knowledge
NEWCOM – SWP2 MEETING 1 Impact of the CSI on the Design of a Multi-Antenna Transmitter with ML Detection Antonio Pascual Iserte Dpt.
Noise Cancelation for MIMO System Prepared by: Heba Hamad Rawia Zaid Rua Zaid Supervisor: Dr.Yousef Dama.
A Data Fusion Approach for Power Saving in Wireless Sensor Networks Reporter : Chi-You Chen.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Distributed and Efficient Classifiers for Wireless Audio-Sensor Networks Baljeet Malhotra Ioanis Nikolaidis Mario A. Nascimento University of Alberta Canada.
Spread Spectrum Techniques
Tin Studio Established 07. In TAITUNG CITY Communication Signal Processing Lab Graduate Institute of Communication Engineering NCNU Cooperative Diversity.
Cooperative Diversity Scheme Based on MIMO-OFDM in Small Cell Network Dong-Hyun Ha Sejong University.
On the Coded Complex Field Network Coding Scheme for Multiuser Cooperative Communications with Regenerative Relays Caixi Key Lab of Information.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Cooperative Molecular Communication for Nanonetwork Liang Hong 1, Wei Chen 1, Feng Liu 2 1 College of Engineering, Tennessee State University, U.S.A. 2.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
A Framework for Energy- Saving Data Gathering Using Two-Phase Clustering in Wireless Sensor Networks Wook Chio, Prateek Shah, and Sajal K. Das Center for.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
1 Energy Efficiency of MIMO Transmissions in Wireless Sensor Networks with Diversity and Multiplexing Gains Wenyu Liu, Xiaohua (Edward) Li and Mo Chen.
CODED COOPERATIVE TRANSMISSION FOR WIRELESS COMMUNICATIONS Prof. Jinhong Yuan 原进宏 School of Electrical Engineering and Telecommunications University of.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
CHANNEL ESTIMATION FOR MIMO- OFDM COMMUNICATION SYSTEM PRESENTER: OYERINDE, OLUTAYO OYEYEMI SUPERVISOR: PROFESSOR S. H. MNENEY AFFILIATION:SCHOOL OF ELECTRICAL,
Ali Al-Saihati ID# Ghassan Linjawi
Distributed State-Estimation Using Quantized Measurement Data from Wireless Sensor Networks Li Chai with Bocheng Hu Professor College of.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
Convergecast with MIMO Luoyi Fu, Yi Qin, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Xue Liu Department of Computer.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Collaborative Communications in Wireless Networks Without Perfect Synchronization Xiaohua(Edward) Li Assistant Professor Department of Electrical and Computer.
Performance analysis of channel estimation and adaptive equalization in slow fading channel Chen Zhifeng Electrical and Computer Engineering University.
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
1 Blind Channel Identification and Equalization in Dense Wireless Sensor Networks with Distributed Transmissions Xiaohua (Edward) Li Department of Electrical.
TI Cellular Mobile Communication Systems Lecture 4 Engr. Shahryar Saleem Assistant Professor Department of Telecom Engineering University of Engineering.
2017/4/25 INDOOR LOCALIZATION SYSTEM USING RSSI MEASUREMENT OF WIRELESS SENSOR NETWORK BASED ON ZIGBEE STANDARD Authors:Masashi Sugano, Tomonori Kawazoe,
Doc.: IEEE /1401r0 Submission November 2014 Slide 1 Shiwen He , Haiming Wang Quasi-Orthogonal STBC for SC-PHY in IEEE aj (45GHz) Authors/contributors:
Secure In-Network Aggregation for Wireless Sensor Networks
University of Houston Cullen College of Engineering Electrical & Computer Engineering Capacity Scaling in MIMO Wireless System Under Correlated Fading.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Doppler Spread Estimation in Frequency Selective Rayleigh Channels for OFDM Systems Athanasios Doukas, Grigorios Kalivas University of Patras Department.
The Scaling Law of SNR-Monitoring in Dynamic Wireless Networks Soung Chang Liew Hongyi YaoXiaohang Li.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Cooperative MIMO Paradigms for Cognitive Radio Networks
Multipe-Symbol Sphere Decoding for Space- Time Modulation Vincent Hag March 7 th 2005.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
V- BLAST : Speed and Ordering Madhup Khatiwada IEEE New Zealand Wireless Workshop 2004 (M.E. Student) 2 nd September, 2004 University of Canterbury Alan.
A Reliability-oriented Transmission Service in Wireless Sensor Networks Yunhuai Liu, Yanmin Zhu and Lionel Ni Computer Science and Engineering Hong Kong.
Code Division Multiple Access (CDMA) Transmission Technology
1 M. H. Ahmed and Salama Ikki Memorial University Newfoundland, Canada Chapter 3 To Cooperate or Not to Cooperate? That Is the Question!
Doc.: aj Submission November 2014 Slide 1 Shiwen He , Haiming Wang Quasi-Orthogonal STBC for IEEE aj ( 45GHz ) Authors/contributors:
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Energy Efficient Detection of Compromised Nodes in Wireless Sensor Networks Haengrae Cho Department of Computer Engineering, Yeungnam University Gyungbuk.
TUNALIData Communication1 Spread Spectrum Chapter 9.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Hui Ji, Gheorghe Zaharia and Jean-François Hélard
Space Time Codes.
Computing and Compressive Sensing in Wireless Sensor Networks
Distributed MIMO Patrick Maechler April 2, 2008.
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
Digital Communication Chapter 1: Introduction
Hongchao Zhou, Fei Liu, Xiaohong Guan
Information Sciences and Systems Lab
Presentation transcript:

1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and Computer Science Tennessee State University Dr. Liang Hong (615) College of Engineering, Technology, and Computer Science Tennessee State University

2 Outline Introduction System Model Compromised Nodes Detection and Symbol Recovery Cooperative Transmission and Security Key Management Schemes Simulations Conclusions Secure cooperative MIMO communications under active compromised nodes Dr. Liang Hong (615) College of Engineering, Technology, and Computer Science Tennessee State University

3 Introduction Wireless sensor networks (WSNs) have been widely deployed in −Military sensing and tracking, environment monitoring, smart home appliances management, health care, etc −WSNs are expected to be the basic building block of pervasive computing Cooperative MIMO can achieve the benefits of MIMO technique without the need of multiple antennas at each sensor node −MIMO can provide significant increases in data rate and link range without additional bandwidth or transmission power −Physical implementation of multiple antenna at a small node is not feasible −Distributed individual single-antenna nodes cooperating on data transmission and reception as a multi-antenna MIMO node Dr. Liang Hong (615) College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

4 Many WSNs have mission-critical tasks, however, the involvement of multiple nodes for transmission and/or receiving poses a challenge to the reliability of the information Node compromise is one of the most detrimental attacks −Active attack: the compromised nodes maliciously modify the relay information and inject falsified information (more severe than passive attacks) Previous security schemes either did not detect and defend against node compromise or needed extra MIMO antennas to achieve data assurance. Dr. Liang Hong (615) College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

5 Our previous work proposed a cross-layer security scheme that combined a cryptographic technique implemented in higher layer with data assurance analysis at the physical layer −Has much less bit errors −Receiving cluster periodically detects compromised nodes −The transmitting and receiving cluster have equal numbers of nodes −Only one compromised node is present in the transmitting cluster −No compromised node is present in the receiving cluster Dr. Liang Hong (615) Develop compromised node detection algorithm for more general scenarios. Research objectives College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

6 System Model Multi-hop cooperative MIMO system Dr. Liang Hong (615) Cooperative strategy: decode-and-forward College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

7 (1) Received signal : received signals at the receiving cluster : additive Gaussian noise components, they are identically distributed and mutually statistically independent, each with a zero mean and a power spectral density Dr. Liang Hong (615) : transmitted signals at the transmitting cluster : channel matrix (m R  m T ) College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

8 Compromised Nodes Detection and Symbol Recovery Dr. Liang Hong (615) Methodology: The CH h of B will perform compromised nodes detection at random time t in each time interval with adaptive security level College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

9 Dr. Liang Hong (615) Compromised nodes detection algorithm 1.The CH h of B requests each of the primary nodes in B to send the received symbols to h. Then h obtained the combined signal 2.Node h uses Inverse Channel Detector to estimate the transmitted symbols s, i.e.,, where W is an m R  m T weighing matrix 3.Since all data streams are the same, h can identify the compromised node x if x didn’t transmit the supposed symbol. –For example, assuming that the primary node x in A is compromised and it is the jth node in A, if s j from step 2 is not the same as the information recovered from the majority of the other nodes, x will be classified as a compromised node College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

10 Dr. Liang Hong (615) Scenario 1: The transmitting and receiving clusters have different number of nodes (2) Scenario 2: More than one compromised node is present in the transmitting cluster In step 3, the recovered data streams from different transmitting nodes will be sorted into groups, where nodes are assigned to the same group if they contain identical symbols. −The group with largest number of nodes is assumed to contain the IDs of trustworthy nodes. All the other nodes are classified as compromised nodes. −If all the groups have the same number of IDs, all the nodes in transmitting cluster are classified as compromised nodes. College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

11 Dr. Liang Hong (615) Scenario 3: Compromised nodes are present in the receiving cluster 1.The CH h in B performs inverse channel detection on the set of received data from each node in B. 2.If two or more of the estimates of the transmitted symbols are the same, then this node in B is not compromised. Its ID will be saved in the trustworthy node group. 3.If none of the estimates of the transmitted symbols are the same, then this node in B is the compromised node. 4.After all the compromised nodes in B are identified, all the trustworthy nodes in B will be used to identify the compromised nodes in A. Using the algorithm in Scenario 2, the compromised nodes in A can be detected College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

12 Dr. Liang Hong (615) Symbol recovery: When the compromised nodes are detected in the transmitting cluster −the CH h in B will send each node in its cluster the information of the compromised nodes in A. −When the node v in B receives this information, it decodes the message by simply setting the columns in channel matrix that corresponds to the compromised nodes to zero When the compromised nodes are detected in the receiving cluster −The CH h in B will send the IDs of the trustworthy nodes to the CH in its next relay. −In the next relay, simply setting the column in channel matrix that corresponds to these compromised nodes to zero. −If compromised nodes are detected in the last receiving cluster, the sink node will use the received data from the trustworthy nodes for symbol detection College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

13 Cooperative Transmission and Security Key Management Schemes The cooperative transmission and security key management schemes proposed in our previous work will be used to provide secure cooperative communications. This security scheme provides secured communication between uncompromised nodes. By combining the compromised nodes detection algorithm, the security of the system will be largely enhanced. Dr. Liang Hong (615) College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

14 Dr. Liang Hong (615) Type of Keys (1) Each cluster: each node has a cluster key C-key(A) for local transmission (2) Each link AB: each node in A and B has a key L-key(A,B) for long-haul transmission between A and B Secured cooperative relay: Step 1 (Local transmission at A): Each node in A encrypts its information with C-key(A), and broadcasts it to other local nodes using different timeslots. Each node uses C- key(A) to decrypt the received m information back. Step 2 (long-haul transmission between A and B): Each node i in A encrypts sequence I with key L-key(A,B), and it acts as ith antenna encoding the encrypted I. Then, all m nodes in A broadcast the encrypted and encoded I to the nodes in B at the same time. When a nodes in B receives m copies of the information, it decrypts them with L- key(A,B), and then decode them back to I. College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

15 Simulations The channels are block Rayleigh fading channels. It is constant during the transmission of one symbol, but is randomly changing between symbols Different channels are identically distributed and statistically independent. Binary phase shift keying (BPSK) is chosen as the modulation scheme. 100 received symbols are used in the proposed algorithms for compromised nodes identification. The maximum likelihood detector is used for symbol demodulation Dr. Liang Hong (615) College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

16 Dr. Liang Hong (615) For scenario 1 and 2 Detection Accuracy Performance Comparison College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

17 Dr. Liang Hong (615) For scenario 1 and 3 Detection Accuracy Performance Comparison College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

18 Conclusions Algorithms for compromised nodes detection are proposed for three more general scenarios. The proposed compromised nodes detector are then used in a cooperative MIMO communication system to enhance the security. The compromised nodes detector has high detection accuracy. The reliability of the information is significantly improved. Dr. Liang Hong (615) College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes

19 Dr. Liang Hong (615) College of Engineering, Technology, and Computer Science Tennessee State University Secure cooperative MIMO communications under active compromised nodes Thank you! Questions?