+ All Categories
Home > Documents > Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is...

Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is...

Date post: 30-Jan-2018
Category:
Upload: dohuong
View: 218 times
Download: 1 times
Share this document with a friend
26
FOR UMD USE ONLY Physical Layer Security Şennur Ulukuş ECE / ISR University of Maryland
Transcript
Page 1: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Physical Layer Security

Şennur UlukuşECE / ISR

University of Maryland

Page 2: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Security in Wireless Systems

A

B

E

Inherent openness in the wireless communications channel:

eavesdropping and jamming attacks

Page 3: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Security in Wireless Systems

Inherent openness in the wireless communications channel:

eavesdropping and jamming attacks

AT&T

You

Page 4: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Security in Wireless Systems

Inherent openness in the wireless communications channel:

eavesdropping and jamming attacks

Your WiFi

You

Your neighbor

Page 5: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Security in Wireless Systems

Inherent openness in the wireless communications channel:

eavesdropping and jamming attacks

Alice

Bob

Eve

Page 6: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

What is the Physical Layer?

The lowest layer of the 7-layer OSI protocol stack.

The level at which bits are transmitted/received.

Page 7: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Countering Security Threats:Current State-of-the-Art

Cryptography:at higher layers of the protocol stackbased on limited computational power at the adversary

Spread spectrum, e.g., frequency hopping and CDMA:at the physical layerbased on limited knowledge at the adversary

Physical layer security:at the physical layerno assumption on adversary’s computational powerno assumption on adversary’s available informationprovable and quantifiable (in bits/sec/hertz)implementable using signal proc, comm and coding techniques

Page 8: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

X

Y

A

B

EZ

C

( | )H W Z

W

Wireless Wiretap Channel

• Perfect secrecy:

• Perfect secrecy capacity:

( | ) ( )H W Z H W=

max ( ; ) ( ; )C I X Y I X Z= −

• For certain channels (but not always): B EC C C= −

Page 9: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Main Tools: Stochastic Encoding

Page 10: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

X

Y

A

B

E

Z

U

Main Tools: Channel Pre-fixing

• Perfect secrecy capacity: max ( ; ) ( ; )C I U Y I U Z= −

Page 11: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Simple Illustrative Example:Stochastic Encoding

A

B

E

Bob has a better (less noisy) channel than Eve.

Page 12: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

Bob’s constellation Eve’s constellation

2log 64 6 b/sBC = = 2log 16 4 b/sEC = =

Bob’s noise Eve’s noise

2 b/ss B EC C C= − =

Page 13: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

Message 1

Message 2

Message 3

Message 4

Divide Bob’s constellation into 4 subsets.

Page 14: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

Message 1

Message 2

Message 3

Message 4

All red stars denote the same message. Pick one randomly.

Page 15: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

Message 1

Message 2

Message 3

Message 4

Bob can decode the message reliably.

Page 16: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

Message 1

Message 2

Message 3

Message 4

For Eve, all 4 messages are equally-likely.

Page 17: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

AB

E

A

B

E

Caveat: Need Channel Advantage

positive secure capacity zero secure capacity

Page 18: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Two Recurring Themes:

1) Creating advantage for the good guys:computational advantage (crypto)knowledge advantage (spread spectrum)channel advantage (physical layer security)

2) Exhausting the capabilities of the bad guys:exhausting computational power (crypto)exhausting searching power (spread spectrum)exhausting decoding capability (physical layer security)

Page 19: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Obvious Applications with Natural Channel Advantage: 1) Near Field Communications

2) Medical Communications 3) Military/Civilian Green Zones

Page 20: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

A

B

E

X

Y

Z

Creating Channel Advantage

Exploiting channel variations (fading)

Opportunistic transmissions

Page 21: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Creating Channel Advantage

Use of multiple antennas

Spatial diversity

A

B

E

X

Y

Z

Page 22: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

A

B

C

E

Cooperation for Security

Cooperation using (or without using) overheard signals.

Page 23: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

A

B

E

C

D

Secure Broadcasting

Secure broadcasting to multiple end-usersin the presence of one or more adversarial nodes.

Page 24: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

A

B

C

Varying Security Clearance Levels

Both B and C are friendly nodes, but they have different security clearances.

We can send secure information to B (un-decodable by C), and visa versa.

Page 25: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

A

D

B

C

Untrusted (but Friendly) Relays

Nodes B and C relay information without being able to decode its content.

Page 26: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information

FOR UMD USE ONLY

Conclusions

Physical-layer security is powerful:no limitation on adversary’s computation power or available informationprovable, quantifiable (bits/sec/hertz) and implementable

Many open problems:explicit code constructionsimplementing in the existing infrastructurebetter modeling adversary – e.g., active adversariesrobust modeling of adversary – e.g., no CSIcombining with cryptography…

Contact me with questions/comments/ideas:Sennur Ulukus [email protected] http://www.ece.umd.edu/~ulukus


Recommended