physical layer security made fast and channel-independent

32
Physical Layer Security Made Fast and Channel-Independent Shyamnath Gollakota Dina Katabi

Upload: ghada

Post on 24-Feb-2016

36 views

Category:

Documents


0 download

DESCRIPTION

Physical Layer Security Made Fast and Channel-Independent. Shyamnath Gollakota Dina Katabi. What is Physical Layer Security?. Introduced by Shannon. Variations known only to sender and receiver . Channel. Receiver. Sender. Time. Why is it interesting?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Physical Layer Security Made Fast and Channel-Independent

Physical Layer Security Made Fast and Channel-Independent

Shyamnath Gollakota

Dina Katabi

Page 2: Physical Layer Security Made Fast and Channel-Independent

What is Physical Layer Security?

Introduced by Shannon

Sender ReceiverChannel

Time

Variations known only to sender and receiver

Page 3: Physical Layer Security Made Fast and Channel-Independent

Why is it interesting?

• No computational hardness assumptions

• Comes free from wireless channel

• Combine with cryptography for stronger security

Page 4: Physical Layer Security Made Fast and Channel-Independent

Past work

• Much work

• 2006 – first empirical demonstration [Trappe’06]

• Effort to increase secrecy rate

[Wyner’75], [Csiszar’78], [Johansson‘01], [Shamai’08]

[Trappe’08], [Krishnamurthy’09], [Kasera’10]

Theory

Practice

Page 5: Physical Layer Security Made Fast and Channel-Independent

But, not fast enough

Mobile (44 bits/s)

For practical key (2048 bits)

0.75 minutes

Page 6: Physical Layer Security Made Fast and Channel-Independent

But, not fast enough

Static (1 bits/s)Mobile (44 bits/s)

For practical key (2048 bits)

0.75 minutes34 minutes

Page 7: Physical Layer Security Made Fast and Channel-Independent

Why is it so slow?Existing practical schemes rely on channel changes

Sender ReceiverSender transmits, receiver measures channel

Receiver transmits, sender measures channel

Exploit Channel Reciprocity

Generating new secret bits requires channel to change

Page 8: Physical Layer Security Made Fast and Channel-Independent

How can we make physical security fast?

Don’t rely on channel changesInstead, introduce changes by jamming

Page 9: Physical Layer Security Made Fast and Channel-Independent

Sender repeats its transmission

RepetitioniJam

Page 10: Physical Layer Security Made Fast and Channel-Independent

For every sample, receiver randomly jams either the original sample or the retransmission

RepetitioniJam

Page 11: Physical Layer Security Made Fast and Channel-Independent

Receiver reconstructs signal by picking clean samples

RepetitioniJam

Page 12: Physical Layer Security Made Fast and Channel-Independent

Eavesdropper does not know which samples are clean and hence cannot decode

No longer requires channel to change

Repetition

Generate secret bits faster

iJam

Page 13: Physical Layer Security Made Fast and Channel-Independent

• First practical physical layer security that doesn’t rely on channel changes

• Implemented and empirically evaluated– 3 orders of magnitude more secret bits– Works with both static and mobile channels

Contributions

Page 14: Physical Layer Security Made Fast and Channel-Independent

Challenge 1: Making clean and jammed samples indistinguishable

BPSK: ‘0’ bit -1 ‘1’ bit +1

Time Samples

+1

-1

Page 15: Physical Layer Security Made Fast and Channel-Independent

Challenge 1: Making clean and jammed samples indistinguishable

BPSK: ‘0’ bit -1 ‘1’ bit +1

Time Samples

+1

-1

Jamming should not change structure of transmitted signal

Page 16: Physical Layer Security Made Fast and Channel-Independent

Solution 1: Exploit characteristics of OFDM

X1 X2 XN+1 -1 +1

IFFT

Y1 Y2 YN

. . . .

. . . .TimeSamples

Modulated bits

By central limit theorem, transmitted samples approximate Gaussian distribution

Time Samples

Page 17: Physical Layer Security Made Fast and Channel-Independent

Solution 1: Exploit characteristics of OFDM

X1 X2 XN+1 -1 +1

IFFT

Y1 Y2 YN

. . . .

. . . .TimeSamples

Modulated bits

Time Samples

Pick jamming samples using a Gaussian Distribution

Page 18: Physical Layer Security Made Fast and Channel-Independent

Pick jamming samples using a Gaussian Distribution

Solution 1: Exploit characteristics of OFDM

X1 X2 XN+1 -1 +1

IFFT

Y1 Y2 YN

. . . .

. . . .TimeSamples

Modulated bits

Time Samples

Harder to distinguish between clean and jammed samples

Page 19: Physical Layer Security Made Fast and Channel-Independent

Challenge 2: Eavesdropper can still exploit signal statistics

Transmitted samples

Jammed samples

Variance of jammed samples greater than clean samples

Using hypothesis testing, eavesdropper can guess

Probability Distribution

Page 20: Physical Layer Security Made Fast and Channel-Independent

Solution 2: Use xoring to reduce eavesdropper’s guessing advantage

Eavesdropper guessing advantage decreases exponentially

.

.

=Secret

Bit Sequence 1

Bit Sequence 2

Bit Sequence N

𝑝

𝑝

𝑝

𝑂 (𝑝𝑛)

Page 21: Physical Layer Security Made Fast and Channel-Independent

Challenge 3: Jam effectively independent of eavesdropper’s location

Sender Receiver

At eavesdropper sender power is larger jamming power

Eavesdropper can decode

Page 22: Physical Layer Security Made Fast and Channel-Independent

Solution 3: Two-way iJam

Sender Receiver

maskjam maskmask

Receiver transmits a mask which the sender jams with iJam

- Sender receives mask, eavesdropper doesn’t

Page 23: Physical Layer Security Made Fast and Channel-Independent

masksecret

Solution 3: Two-way iJam

Sender Receiver

jam

Receiver transmits a mask which the sender jams with iJam

Sender transmits XOR of the secret with mask which sender jams

masksecret

masksecretmask

- Sender receives mask, eavesdropper doesn’t

- Both receiver and eavesdropper receive the XOR

Page 24: Physical Layer Security Made Fast and Channel-Independent

Sender Receiver

Receiver transmits a mask which the sender jamsSender transmits the XOR of the secret with mask which sender jams

mask = secret

• Receiver can decode secret• Eavesdropper can not decode secret

Solution 3: Two-way iJam

masksecret

mask masksecret

Page 25: Physical Layer Security Made Fast and Channel-Independent

Empirical Results

Page 26: Physical Layer Security Made Fast and Channel-Independent

Implementation

• USRP/USRP2

• Carrier Freq: 2.4-2.48GHz

• OFDM and QAM modulations

Page 27: Physical Layer Security Made Fast and Channel-Independent

Testbed

• 20-node testbed

• Each run randomly picks two nodes to be Sender and Receiver

• Every other node acts as eavesdropper

• Eavesdropper uses optimal hypothesis testing

Page 28: Physical Layer Security Made Fast and Channel-Independent

Bit Error Rate at the Eavesdropper

Independent of location, Eavesdropper’s BER is close to a random guess

Page 29: Physical Layer Security Made Fast and Channel-Independent

Can an iJam receiver decode while jamming?

Receiver can decode despite jamming

Page 30: Physical Layer Security Made Fast and Channel-Independent

Prior Work: 1 bit/s

Secrecy Rate

Page 31: Physical Layer Security Made Fast and Channel-Independent

3 orders of magnitude more secret bits than prior schemes

Prior Work: 1 bit/s

Secrecy Rate

Page 32: Physical Layer Security Made Fast and Channel-Independent

Conclusion

• First practical physical layer security that doesn’t rely on channel changes

• Implemented and empirically evaluated– 3 orders of magnitude more secret bits– Works with both static and mobile channels