L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University ICC 2008 This work is supported in part.

Slides:



Advertisements
Similar presentations
OFDM Transmission Technique Orthogonal Frequency Division Multiplexer
Advertisements

Comparison of different MIMO-OFDM signal detectors for LTE
A Novel Finger Assignment Algorithm for RAKE Receivers in CDMA Systems Mohamed Abou-Khousa Department of Electrical and Computer Engineering, Concordia.
Channel Estimation in OFDM Systems Zhibin Wu Yan Liu Xiangpeng Jing.
OFDM based for WIFI Ziqi SONG Zhuo ZHANG Supervisor: Prabin.
Interference Cancellation Algorithm with Pilot in 3GPP/LTE
Development of Parallel Simulator for Wireless WCDMA Network Hong Zhang Communication lab of HUT.
Channel Estimation for Mobile OFDM
Hacettepe University Robust Channel Shortening Equaliser Design Cenk Toker and Semir Altıniş Hacettepe University, Ankara, Turkey.
Diversity techniques for flat fading channels BER vs. SNR in a flat fading channel Different kinds of diversity techniques Selection diversity performance.
Powerline Communications: Channel Characterization and Modem Design Yangpo Gao Helsinki University of Technology
CARA: Collision-Aware Rate Adaptation for IEEE WLANs Presented by Eric Wang 1.
Optimization of pilot Locations in Adaptive M-PSK Modulation in a Rayleigh Fading Channel Khaled Almustafa Information System Prince Sultan University.
ISSPIT Ajman University of Science & Technology, UAE
10 th MCM - Novi Sad, March 2006 Joaquim Bastos ( ) 1 The information in this document is provided as is and no guarantee or warranty.
OFDM and MC-CDMA: An Implementation using MATLAB Arjun R. Kurpad1PI99EC 014 Ashish Uthama1PI99EC 017 Saptarshi Sen1PI99EC 089 Shounak Mondal1PI99EC 096.
1 Mobile Communication Systems 1 Prof. Carlo Regazzoni Prof. Fabio Lavagetto.
Multipath fading and reflections The signal takes many paths to the destination. The propagation delay along each path is different. How many meters difference.
RAKE Receiver Marcel Bautista February 12, Propagation of Tx Signal.
1 Synchronization for OFDMA System Student: 劉耀鈞 Advisor: Prof. D. W. Lin Time: 2006/3/16.
#7 1 Victor S. Frost Dan F. Servey Distinguished Professor Electrical Engineering and Computer Science University of Kansas 2335 Irving Hill Dr. Lawrence,
ECE 776 Information Theory Capacity of Fading Channels with Channel Side Information Andrea J. Goldsmith and Pravin P. Varaiya, Professor Name: Dr. Osvaldo.
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Event: CUBAN/WIP Workshop - Tunisia Date: May 2005 Slide 1 Adaptive modulation and multiuser scheduling gains in adaptive TDMA/OFDMA systems in the.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Sep 08, 2005CS477: Analog and Digital Communications1 Example Systems, Signals Analog and Digital Communications Autumn
1 Lecture 9: Diversity Chapter 7 – Equalization, Diversity, and Coding.
Practical Performance of MU- MIMO Precoding in Many-Antenna Base Stations Clayton Shepard Narendra Anand Lin Zhong.
Multiantenna-Assisted Spectrum Sensing for Cognitive Radio
Seyed Mohamad Alavi, Chi Zhou, Yu Cheng Department of Electrical and Computer Engineering Illinois Institute of Technology, Chicago, IL, USA ICC 2009.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
1 Mohammed M. Olama Seddik M. Djouadi ECE Department/University of Tennessee Ioannis G. PapageorgiouCharalambos D. Charalambous Ioannis G. Papageorgiou.
Capacity Variation of Indoor Radio MIMO Systems Using a Deterministic Model A. GrennanDIT C. DowningDIT B. FoleyTCD.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
1 PERFORMANCE OF FREQUENCY OFFSET SYNCHRONIZATION IN A SINGLE AND MULTI-ANTENNA IEEE SYSTEM José A. Rivas Cantero M. Julia Fernández-Getino.
Adaptation Techniques in Wireless Packet Data Services Speaker: Chih-Wei Wang Advisor: Li-Chun Wang.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Copyright 2005 Macrodiversity Packet Combining for the IEEE a Uplink Shi Cheng and Matthew C. Valenti Lane Dept. of Comp. Sci. & Elect. Eng. West.
CHANNEL ESTIMATION FOR MIMO- OFDM COMMUNICATION SYSTEM PRESENTER: OYERINDE, OLUTAYO OYEYEMI SUPERVISOR: PROFESSOR S. H. MNENEY AFFILIATION:SCHOOL OF ELECTRICAL,
Doc.: n-proposal-statistical-channel-error-model.ppt Submission Jan 2004 UCLA - STMicroelectronics, Inc.Slide 1 Proposal for Statistical.
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Data and Computer Communications Chapter 6 – Digital Data Communications Techniques.
Doc.: IEEE /0553r1 Submission May 2009 Alexander Maltsev, Intel Corp.Slide 1 Path Loss Model Development for TGad Channel Models Date:
Wireless Multiple Access Schemes in a Class of Frequency Selective Channels with Uncertain Channel State Information Christopher Steger February 2, 2004.
Advancing Wireless Link Signatures for Location Distinction Mobicom 2008 Junxing Zhang, Mohammad H. Firooz Neal Patwari, Sneha K. Kasera University of.
Doppler Spread Estimation in Frequency Selective Rayleigh Channels for OFDM Systems Athanasios Doukas, Grigorios Kalivas University of Patras Department.
Combined Linear & Constant Envelope Modulation
3: Diversity Fundamentals of Wireless Communication, Tse&Viswanath 1 3. Diversity.
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University CISS 2008 This work is supported in part.
EC 2401*** WIRELESS COMMUNICATION. Why Wireless Benefits – Mobility: Ability to communicate anywhere!! – Easier configuration, set up and lower installation.
doc.: IEEE /183r0 Submission March 2002 David Beberman, Corporate Wave Net, Inc.Slide 1 Single Burst Contention Resolution “Wireless Collision.
Doc.: IEEE /00144r0 Submission 3/01 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks Dialog with FCC Nada.
1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.
Overcoming the Sensing-Throughput Tradeoff in Cognitive Radio Networks ICC 2010.
Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December.
Diversity.
Proposal for Statistical Channel Error Model
EE359 – Lecture 8 Outline Capacity of Flat-Fading Channels
Advanced Wireless Networks
Advanced Wireless Networks
On the Suitability of Repetition for ah
A Rate-Adaptive MAC Protocol for Multi-Hop Wireless Networks
Colorado School of Mines
Characterizations and Modeling of the Wireless Channel
Channel Estimation 黃偉傑.
MIMO-OFDM with antenna selection
Fading multipath radio channels
Powerline Communications: Channel Characterization and Modem Design
Channel Estimation in OFDM Systems
Channel Estimation in OFDM Systems
Presentation transcript:

L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University ICC 2008 This work is supported in part by NSF grant CNS A Physical-Layer Technique to Enhance Authentication for Mobile Terminals

Outline Channel-based authentication Challenge: Terminal mobility Enhanced channel-based authentication Inter-burst authentication Intra-burst authentication Simulation results Conclusion 2/15/2016 2

PHY-based Security Techniques 3

Benefits of Multipath Fading CDMA: Rake processing that transforms multipath into a diversity-enhancing benefit MIMO: Transforms scatter-induced Rayleigh fading into a capacity-enhancing benefit Fingerprints in the Ether: Distinguishes channel responses of different paths to enhance authentication 2/15/2016 4

Fingerprints in the Ether Fingerprints in the Ether: In typical indoor environments, the wireless channel decorrelates rapidly in space The channel response is hard to predict and to spoof 5 Top View of Alcatel-Lucent’s Crawford Hill Laboratory, Holmdel, NJ

Channel-Based Authentication Wireless networks are vulnerable to various identity-based attacks, like spoofing attacks System overhead can be large if every message is protected by upper-layer authentication/encryption Channel-based authentication: Detect attacks for each message, significantly reducing the number of calls for upper-layer authentication Works well under time-invariant channels and stationary terminals in spoofing detection 2/15/2016 6

System Model Multicarrier systems, e.g., OFDM Also applies to single-carrier systems Each burst contains multiple frames Each frame (with duration of T) contains pilot symbols at M subbands Reuse the existing channel estimation mechanism 2/15/ Data transmission

Alice sent the first message If Alice is silent, Eve may spoof her by using her identity (e.g., MAC address) in the second message Bob measures, stores and compares channel vectors in consecutive messages, “Who is the current transmitter, Alice or Eve?” Spatial variability of multipath propagation: H A H E (with high probability) Time-invariant channel: Constant H A Alice-Bob-Eve Model 2/15/ HAHA Eve Alice Bob HEHE

Challenge: What If Alice Moves? Channel response, H A, changes quickly as Alice moves Alice may be mistakenly regarded as Eve Larger false alarm rate Larger channel variation, for larger r (displacement of Alice during one frame) Performance worsened by large intervals between data bursts 9 HAHA Alice Bob H’ A r Alice

Inter-Burst Authentication 2/15/ To solve the problem of large channel time variations due to long inter-burst intervals Authentication of the first frames in data bursts Key generation at Alice Based on the channel response at a specified frame in the previous data burst Feedback from the receiver Channel measurement in the TDD system

Intra-Burst Authentication Authentication of the following frames in data bursts Based on channel vectors (each with M elements) from channel estimation at M tones in consecutive frames H A (k-1), H A (k-2), … (Alice) H t (k) (Maybe Alice, maybe Eve) Channel model Receiver thermal noise, AWGN Phase measurement drifts 2/15/

Intra-Burst Authentication -2 Hypothesis testing: H 0 : H 1 : Test statistic: Rejection region of H 0 : False alarm rate, Miss rate, 2/15/ No Spoofing Spoofing!!!

Intra-Burst Authentication -3 Neyman-Pearson test-based scheme: Given, Eve has much larger uncertainty of the channel response than Alice, at time k Test statistic: Recursive least-squares (RLS) adaptive filters-based scheme: M parallel independent RLS filters for channel estimation Eve usually leads to larger RLS estimation error than Alice Test statistic: Larger system overhead: Ensure the previous 3L frames all came from Alice 13

Simulation Scenario Transmitter mobility in wireless Indoor environment Frequency response at 4.75, 5.0, and 5.25 GHz, for any T-R path, as FT of the impulse response, obtained using the Alcatel-Lucent ray-tracing tool WiSE Consider N E =1000 locations of Eve, N A =50 traces of Alice, each with N x =100 frames. In each scenario, N n =5 i.i.d. complex Gaussian thermal noise is generated. 2/15/

Simulation Results 2/15/2016 NP-based statistic has good performance if r<5 mm, corresponding to transmitter velocity of 1.43 mps, with frame duration of 3.5 ms Adaptive filter-based statistic is less robust than NP-based scheme to terminal mobility NP-based RLS-based 15 Alice moves faster

We proposed an enhanced PHY-layer authentication scheme Inter-burst authentication: Channel response in previous burst is used as the key for the authentication of the first frame in the data burst Intra-burst authentication: NP-based test vs. RLS adaptive filter based scheme Verified using a ray-tracing tool (WiSE) for indoor environments NP-based test is more robust against terminal mobility, and more efficient in terms of system overhead and implementation complexity It correctly detects 96% of spoofing attacks, while reduces unnecessary calls of upper-layer authentications by 94%, with transmitters moving at a typical pedestrian speed (1.43 mps), and frame duration of 3.5 ms. Conclusion 2/15/