improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/conet/slides/improve...

21
Improve physical layer security via cooperation Ning zhang 1

Upload: others

Post on 28-May-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Improve physical layer security via cooperation

Ning zhang

1

Page 2: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

OutlineOutlinePh i l l it• Physical layer security

• Approach based on Multiple antennas • Cooperation for security

– Single cooperative relay (with/without jamming)M l i l i l– Multiple cooperative relays

• Conclusion

2

Page 3: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Physical layer securityPhysical layer security • SECURITY is a critical concern in ireless net orks d e to the open ireless• SECURITY is a critical concern in wireless networks due to the open wireless

medium. Any receiver within the range of a wireless transmission can potentially overhear the transmitted information.

• Security against eavesdropping can be achieved by using cryptographic algorithms. – However, there are difficulties and vulnerabilities associated with key distribution andHowever, there are difficulties and vulnerabilities associated with key distribution and

management.– The implementation of secrecy at higher layers becomes the subject of increasing

potential attacks.Sensor or other kind of networks don’t have the seven layers structure and can not– Sensor or other kind of networks don t have the seven layers structure and can not support key or …. Without key

– Physical layer security has its own advantages

• Physical layer security, which exploits the physical characteristics of wireless channels for secure transmission.

3

Page 4: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Physical layer securityPhysical layer security

4

Page 5: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Physical layer securityPhysical layer security St di d f t ith “k l ” it (f PHY• Studied for systems with “key-less” security (from a PHY aspect).

• In the above system with a source, destination and y ,eavesdropper.– Eavesdropper is “passive”, i.e., eavesdropper does not transmit

any signal with the intention of jamming the destinationany signal with the intention of jamming the destination.– Eavesdropper only “listens” to the information transmitted by

the source.•  The channel between the source and destination is called the

“main channel”.• The channel between the source and eavesdropper is called• The channel between the source and eavesdropper is called

the “eavesdropper channel”.

5

Page 6: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Physical layer securityPhysical layer security

• Is it possible for the source to transmit in such a way that the information can be received yproperly by the destination but not by the eavesdropper?eavesdropper?

• This question is answered by measuring the “secrecy capacity”secrecy capacity

6

Page 7: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Physical layer securityPhysical layer security S i i h diff f h l• Secrecy capacity is the difference of the mutual information between the transmitter and the intended

i h dreceiver versus the eavesdropper.• Secrecy capacity can be computed the difference

between the Shannon capacity of the main channel and that of the eavesdropper channel.

7

Page 8: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Physical layer securityPhysical layer security • Let the Signal-to-Noise ratio (SNR) seen by the destination be

and that seen by the eavesdropper be .Th S it f th b t• The Secrecy capacity, , for the above system with bandwidth is given by

where

8

Page 9: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Physical layer securityPhysical layer security

• When the eavesdropper channel is a degraded version of the main channelWhen the eavesdropper channel is a degraded version of the main channel, the source and destination can exchange perfectly secure messages at a nonzero rate, while the eavesdropper can learn almost nothing about the messages from its observationsmessages from its observations.

• The feasibility of traditional PHY-based security approaches based on y y ppsingle antenna systems is hampered by channel conditions: if the channel between source and destination is worse than the channel between source and eavesdropper the secrecy capacity is typical zeroand eavesdropper, the secrecy capacity is typical zero .

9

Page 10: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Multiple antennasMultiple antennas• The key idea is that a transmitter can generate noise artificially to conceal

the secret message that it is transmitting.• The noise is generated such that only the eavesdropper is affected but not g y pp

the intended receiver.

10

Page 11: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Multiple antennasMultiple antennas• The transmitter transmit xk at time k. The signals received by the legitimate

receiver (B) and the eavesdropper (E) are, respectively,

• where uk is the desired signal and wk is a statistically independent, g y pGaussian distributed artificial noise .

• Here, wk is chosen such that 

• Then, the secrecy capacity is given byThen, the secrecy capacity is given by

11

Page 12: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

One cooperative relayOne cooperative relay • Assumptions:

– Non-direct links: The direct links S→D and S →E are not available(deep fading) and thus communication is performed via the relay nodes. g) p yEavesdropper cannot overhear the broadcast channel but only the cooperative channel.

– Clustered applications: The source and there lays are located in the same cluster,Clustered applications: The source and there lays are located in the same cluster, while destination and eavesdropper are located outside the cluster.

12

Page 13: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

One cooperative relayOne cooperative relay

• The selected relay increases the perfect secrecy of the relaying link .Th l d j i i f h d• The selected jammer increases interference at the eavesdropper node to decrease the capacity of eavesdropper link.

13

Page 14: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

One cooperative relayOne cooperative relay A. Selection techniques without jamming(a conventional relay)• 1) Conventional selection(CS):

This solutions does not take into account the eavesdropper channelsThis solutions does not take into account the eavesdropper channels

• 2) Optimal selection(OS):) p ( )This solution takes into account the relay-eavesdroppers links (global instantaneous knowledge for all the links)

• 3) Suboptimal selection(SS):3) Suboptimal selection(SS):Only average channel knowledge for the eavesdropper link is available

14

Page 15: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

One cooperative relayOne cooperative relay Relay and jammer selection

For high SNR cases

15

Page 16: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Multiple cooperative relaysMultiple cooperative relays

Two phases and the power of the message signal s0 is normalized to one, i.e, E{|s0|2} = 1.E{|s0| } 1.

ai baseband complex channel gain between the S and the ith cluster node i, hi channel gain between the ith cluster node and the D, gi j channel gain between the ith cluster node and the jth Egi,j channel gain between the ith cluster node and the jth E.

16

Page 17: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Multiple cooperative relaysMultiple cooperative relays• Phase1: The source broadcasts its message signal s0 locally to its trusted

relays within the cluster. The received signal at the ith relay node is xi

• Phase 2: Both the source node and all the N−1 trusted relays participate in hi h d i i i h d i l f hthis stage. For the source node, it transmits a weighted signal of the

noiseless signal s0, i.e., w0s0; for the ith relay, it transmits a weighted version of the received noisy signal in Stage 1, i.e., wixi, and wi represents the weight the weight of the ith cluster node.

17

Page 18: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Multiple cooperative relaysMultiple cooperative relays

• The received signal at the destination equals

• Using maximal ratio combining (MRC), the capacity at the destination is

wherewhere

18

Page 19: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Multiple cooperative relaysMultiple cooperative relays• The received signal at the jth eavesdropper equals• The received signal at the jth eavesdropper equals

• The capacity at the jth eavesdropper is then

where • The secrecy capacity for jth eavesdroppers is definedThe secrecy capacity for jth eavesdroppers is defined

• Design weights to maximize the secrecy capacity

19where

Page 20: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

ConclusionConclusion• Physical layer security• Approaches based on multiple antennas and cooperation are

dproposed.• The main objective of these techniques is to boost the capacity

of the main channel and decrease the capacity of theof the main channel and decrease the capacity of the eavesdropper channel, simultaneously .

20

Page 21: Improve physical layer security via cooperationbbcr.uwaterloo.ca/~m6ismail/CoNET/Slides/Improve physical... · 2012-02-19 · Physical layer securityPhysical layer security • SECURITY

Th kThanks

21