1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2.

Slides:



Advertisements
Similar presentations
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Advertisements

Minimum Redundancy MIMO Radar Chun-Yang Chen and P. P. Vaidyanathan California Institute of Technology Electrical Engineering/DSP Lab ISCAS 2008.
Prakshep Mehta ( ) Guided By: Prof. R.K. Shevgaonkar
The Impact of Channel Estimation Errors on Space-Time Block Codes Presentation for Virginia Tech Symposium on Wireless Personal Communications M. C. Valenti.
Enhancing Secrecy With Channel Knowledge
Physical Layer Security Made Fast and Channel-Independent Shyamnath Gollakota Dina Katabi.
1 Cooperative Transmissions in Wireless Sensor Networks with Imperfect Synchronization Xiaohua (Edward) Li, Mo Chen and Wenyu Liu Department of Electrical.
Noise Cancelation for MIMO System Prepared by: Heba Hamad Rawia Zaid Rua Zaid Supervisor: Dr.Yousef Dama.
Quantum Cryptography Ranveer Raaj Joyseeree & Andreas Fognini Alice Bob Eve.
Mattias Wennström Signals & Systems Group Mattias Wennström Uppsala University Sweden Promises of Wireless MIMO Systems.
Optimization of pilot Locations in Adaptive M-PSK Modulation in a Rayleigh Fading Channel Khaled Almustafa Information System Prince Sultan University.
ISSPIT Ajman University of Science & Technology, UAE
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY A Framework for Partial Secrecy.
APPLICATION OF SPACE-TIME CODING TECHNIQUES IN THIRD GENERATION SYSTEMS - A. G. BURR ADAPTIVE SPACE-TIME SIGNAL PROCESSING AND CODING – A. G. BURR.
Space Time Block Codes Poornima Nookala.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
Joint work with Miguel Rodrigues, Munnunjahan Ara, Vinay Prabhu and João Xavier Filter Design with Secrecy Constraints Hugo Reboredo Instituto de Telecomunicações.
Muhammad Imadur Rahman1, Klaus Witrisal2,
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
A FREQUENCY HOPPING SPREAD SPECTRUM TRANSMISSION SCHEME FOR UNCOORDINATED COGNITIVE RADIOS Xiaohua (Edward) Li and Juite Hwu Department of Electrical and.
MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS (MIMO)
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
KAIS T A lightweight secure protocol for wireless sensor networks 윤주범 ELSEVIER Mar
1 Cooperative STBC-OFDM Transmissions with Imperfect Synchronization in Time and Frequency Fan Ng and Xiaohua(Edward) Li Department of Electrical and Computer.
1 Performance Analysis of Coexisting Secondary Users in Heterogeneous Cognitive Radio Network Xiaohua Li Dept. of Electrical & Computer Engineering State.
Integration of System Design and Standard Development in Digital Communication Education Xiaohua(Edward) Li State University of New York at Binghamton.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
Transmit Diversity with Channel Feedback Krishna K. Mukkavilli, Ashutosh Sabharwal, Michael Orchard and Behnaam Aazhang Department of Electrical and Computer.
1 Energy Efficiency of MIMO Transmissions in Wireless Sensor Networks with Diversity and Multiplexing Gains Wenyu Liu, Xiaohua (Edward) Li and Mo Chen.
1 Power Efficient Wireless Sensor Networks with Distributed Transmission-Induced Space Spreading Xiaohua (Edward) Li and N. Eva Wu Department of Electrical.
Rei Safavi-Naini University of Calgary Joint work with: Hadi Ahmadi iCORE Information Security.
Ali Al-Saihati ID# Ghassan Linjawi
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Collaborative Communications in Wireless Networks Without Perfect Synchronization Xiaohua(Edward) Li Assistant Professor Department of Electrical and Computer.
Introduction to Quantum Key Distribution
Cognitive Radio for Dynamic Spectrum Allocation Systems Xiaohua (Edward) Li and Juite Hwu Department of Electrical and Computer Engineering State University.
1 Blind Channel Identification and Equalization in Dense Wireless Sensor Networks with Distributed Transmissions Xiaohua (Edward) Li Department of Electrical.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
University of Houston Cullen College of Engineering Electrical & Computer Engineering Capacity Scaling in MIMO Wireless System Under Correlated Fading.
Doppler Spread Estimation in Frequency Selective Rayleigh Channels for OFDM Systems Athanasios Doukas, Grigorios Kalivas University of Patras Department.
Channel Independent Viterbi Algorithm (CIVA) for Blind Sequence Detection with Near MLSE Performance Xiaohua(Edward) Li State Univ. of New York at Binghamton.
EE359 – Lecture 12 Outline Combining Techniques
Channel-Independent Viterbi Algorithm (CIVA) for DNA Sequencing
Presented by Abhijit Mondal Haritabh Singh Suman Mondal
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University CISS 2008 This work is supported in part.
A Simple Transmit Diversity Technique for Wireless Communications -M
EE359 – Lecture 15 Outline Announcements: HW posted, due Friday MT exam grading done; l Can pick up from Julia or during TA discussion section tomorrow.
1 M. H. Ahmed and Salama Ikki Memorial University Newfoundland, Canada Chapter 3 To Cooperate or Not to Cooperate? That Is the Question!
1 Channel Equalization for STBC- Encoded Cooperative Transmissions with Asynchronous Transmitters Xiaohua (Edward) Li, Fan Ng, Juite Hwu, Mo Chen Department.
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University ICC 2008 This work is supported in part.
Quantum Cryptography Antonio Acín
Zahoor Ahmed J.P.Cances V.Meghdadi Cryptographic Spread Spectrum Relay Communication NGMAST 2008.
EE359 – Lecture 16 Outline Announcements Proposals due this Friday, 5pm (create website, url) HW 7 posted today, due 12/1 TA evaluations: 10 bonus.
Hop Optimization and Relay Node Selection in Multi-hop Wireless Ad- hoc Networks Xiaohua (Edward) Li Department of Electrical and Computer Engineering.
Multiple Antennas.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Sept Best Paper Award Unified Analysis of Linear Block Precoding for Distributed Antenna Systems Toshiaki Koike-Akino1 Andreas F. Molisch2 Zhifeng.
MULTIPLE INPUT MULTIPLE OUTPUT SYSTEMS (MIMO)
Xiaohua (Edward) Li and Juite Hwu
Combining Dirty-Paper Coding and Artificial Noise for Secrecy
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
Channel Spoofer: Defeating Channel Variability and Unpredictability
Master Thesis Presentation
Information-Theoretic Security
Information Sciences and Systems Lab
Presentation transcript:

1 Space-Time Transmissions for Wireless Secret-Key Agreement with Information-Theoretic Secrecy Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical and Computer Engineering State University of New York at Binghamton {xli, 2 Air Force Research Lab, AFRL/IFGB,

2 Major Contributions An innovative way of secure waveform design: use antenna redundancy/diversity, instead of spread spectrum Practical solutions for a challenge in information theory: Wyner’s wire-tap channel with perfect secrecy New wireless security techniques for secret- key agreement with provable, unconditional secrecy

3 Contents 1.Introduction 2.Randomized space-time transmission 3.Transmission secrecy 4.Simulations 5.Conclusions

4 1. Introduction Physical-layer built-in security: –Guarantee Low-Probability-of-Interception (LPI) based on transmission properties, not data encryption –No a priori secret keys required, different from spread-spectrum- based traditional secure waveform designs Physical-layer transmissions with information-theoretic secrecy –Secure transmissions in the physical-layer –Provide ways for secret-key agreement: assist upper-layer security techniques, support cross-layer security design for end- to-end security An innovative idea –Use antenna redundancy and channel diversity, not spread- spectrum

5 Classic Shannon secrecy model –Alice & Bob exchange messages for secret key agreement Eve can acquire all (and identical) messages received by Alice or Bob –Perfect secrecy impractical under Shannon model Perfect secrecy: Eve’s received signals give no more information for eavesdropping than guessing Provably secure: information-theoretic secrecy –Computational secrecy achievable Based on intractable computation problem Intractability unproven

6 New secrecy models in wireless transmissions –Eve’s channels and received signals are different from Alice’s or Bob’s –Provide new ways to realize information-theoretic secrecy, to design transmissions with build-in security

7 Wire-tap channel (Wyner, 1975) –Secret channel capacity from Alice to Bob –Positive secret channel capacity requires Eve’s channel being noisier  not practical enough –Theoretically significant

8 If Alice & Bob exchange information by public discussion, secret channel capacity increases to –Large capacity requires Eve have large error rate  still not practical enough

9 Objectives: –Based on the new model, design new transmissions to realize information-theoretic secrecy –Investigate two fundamental problems of physical-layer security Achievable secret channel capacity Cost of achieving such secret channel capacity

10 2. Randomized Space-Time Transmission Can we guarantee a large or in practice? –Yes, use randomized space-time transmission and the limit of blind deconvolution (CISS’2005) –This paper: what if Eve knows the channel? Basic idea: –Use redundancy of antenna array transmissions to create intentional ambiguity –Eve can not resolve such ambiguity, can not estimate symbols –High secret channel capacity guaranteed

11 Assumptions –Alice: J transmit antenna –Alice and Bob: can estimate their own channel, do not know Eve’s channel. No a priori secret key shared. –Eve: knows her own channel, but not know Alice & Bob’s channel. Has infinitely high SNR

12 Alice can estimate h via reciprocity. Traditional transmit beamforming has no secrecy. Transmission and signal models

13 Alice select weights by solving Bob receives signal By estimating received signal power, Bob can detect signals Key points: –Bob need not know F, {c i (n)} –Redundancy in selecting weights –Transmission power larger than optimal transmit beamforming

14 3. Transmission secrecy Why do we need randomized array transmission? –Eve can easily estimate by training/blind deconvolution methods otherwise –Examples: if using optimal transmit beamforming, Eve’ deconvolution is possible

15 Consider the extreme case: Eve knows her channel and has extremely high SNR, then Eve’s received signal becomes Secrecy relies on –Alice uses proper for randomization: requires transmission redundancy –Eve’s knowledge on is useless

16 In our scheme, are used to create intentional ambiguity to Eve, but not Bob –Proposition 1: –Proposition 2:

17 Information-theoretic secrecy –Eve’s received signal gives no more information for symbol estimation  an error rate as high as purely guessing –Bob’s error rate is due to noise and Alice’s channel knowledge mismatch. It can be much less than Eve’s error rate –Information theory guarantees high and positive secret channel capacity –Ways for implementing secret-key agreement protocol to be developed

18 Complexity of Eve’s exhaustive search – –Increases with block time-varying channels –Complexity can be much higher with MIMO and space-time transmissions by using the limit of blind deconvolution  Eve has to search H u too. Trade-off in transmission power and secrecy –Cost of realizing secrecy: increased transmission power while using antenna redundancy –Transmission data rate (spectrum efficiency) is not traded

19 4. Simulations BER of the proposed transmission scheme –J=4, QPSK. Bob has identical performance as optimal transmit beamforming.

20 Secret channel capacity with the simulated BER –Eve can not estimate symbols. Capacity calculated as C 1 and C 2. –For “Unsec”, Eve has the same error rate as Bob.

21 Total transmission power and standard deviation –Proposed scheme trades transmission power for secrecy

22 Transmission power and deviation of a single transmitter

23 5. Conclusions Propose a randomized array transmission scheme for wireless secret-key agreement Use array redundancy (more antenna, higher power) to create intentional ambiguity Demonstrate that information-theoretic secrecy concept is practical based on the redundancy and diversity of space-time transmissions