physical layer security - umiacs … · for umd use only conclusions physical-layer security is...
TRANSCRIPT
![Page 1: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/1.jpg)
FOR UMD USE ONLY
Physical Layer Security
Şennur UlukuşECE / ISR
University of Maryland
![Page 2: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/2.jpg)
FOR UMD USE ONLY
Security in Wireless Systems
A
B
E
Inherent openness in the wireless communications channel:
eavesdropping and jamming attacks
![Page 3: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/3.jpg)
FOR UMD USE ONLY
Security in Wireless Systems
Inherent openness in the wireless communications channel:
eavesdropping and jamming attacks
AT&T
You
![Page 4: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/4.jpg)
FOR UMD USE ONLY
Security in Wireless Systems
Inherent openness in the wireless communications channel:
eavesdropping and jamming attacks
Your WiFi
You
Your neighbor
![Page 5: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/5.jpg)
FOR UMD USE ONLY
Security in Wireless Systems
Inherent openness in the wireless communications channel:
eavesdropping and jamming attacks
Alice
Bob
Eve
![Page 6: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/6.jpg)
FOR UMD USE ONLY
What is the Physical Layer?
The lowest layer of the 7-layer OSI protocol stack.
The level at which bits are transmitted/received.
![Page 7: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/7.jpg)
FOR UMD USE ONLY
Countering Security Threats:Current State-of-the-Art
Cryptography:at higher layers of the protocol stackbased on limited computational power at the adversary
Spread spectrum, e.g., frequency hopping and CDMA:at the physical layerbased on limited knowledge at the adversary
Physical layer security:at the physical layerno assumption on adversary’s computational powerno assumption on adversary’s available informationprovable and quantifiable (in bits/sec/hertz)implementable using signal proc, comm and coding techniques
![Page 8: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/8.jpg)
FOR UMD USE ONLY
X
Y
A
B
EZ
C
( | )H W Z
W
Wireless Wiretap Channel
• Perfect secrecy:
• Perfect secrecy capacity:
( | ) ( )H W Z H W=
max ( ; ) ( ; )C I X Y I X Z= −
• For certain channels (but not always): B EC C C= −
![Page 9: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/9.jpg)
FOR UMD USE ONLY
Main Tools: Stochastic Encoding
![Page 10: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/10.jpg)
FOR UMD USE ONLY
X
Y
A
B
E
Z
U
Main Tools: Channel Pre-fixing
• Perfect secrecy capacity: max ( ; ) ( ; )C I U Y I U Z= −
![Page 11: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/11.jpg)
FOR UMD USE ONLY
Simple Illustrative Example:Stochastic Encoding
A
B
E
Bob has a better (less noisy) channel than Eve.
![Page 12: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/12.jpg)
Bob’s constellation Eve’s constellation
2log 64 6 b/sBC = = 2log 16 4 b/sEC = =
Bob’s noise Eve’s noise
2 b/ss B EC C C= − =
![Page 13: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/13.jpg)
Message 1
Message 2
Message 3
Message 4
Divide Bob’s constellation into 4 subsets.
![Page 14: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/14.jpg)
Message 1
Message 2
Message 3
Message 4
All red stars denote the same message. Pick one randomly.
![Page 15: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/15.jpg)
Message 1
Message 2
Message 3
Message 4
Bob can decode the message reliably.
![Page 16: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/16.jpg)
Message 1
Message 2
Message 3
Message 4
For Eve, all 4 messages are equally-likely.
![Page 17: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/17.jpg)
FOR UMD USE ONLY
AB
E
A
B
E
Caveat: Need Channel Advantage
positive secure capacity zero secure capacity
![Page 18: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/18.jpg)
FOR UMD USE ONLY
Two Recurring Themes:
1) Creating advantage for the good guys:computational advantage (crypto)knowledge advantage (spread spectrum)channel advantage (physical layer security)
2) Exhausting the capabilities of the bad guys:exhausting computational power (crypto)exhausting searching power (spread spectrum)exhausting decoding capability (physical layer security)
![Page 19: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/19.jpg)
FOR UMD USE ONLY
Obvious Applications with Natural Channel Advantage: 1) Near Field Communications
2) Medical Communications 3) Military/Civilian Green Zones
![Page 20: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/20.jpg)
FOR UMD USE ONLY
A
B
E
X
Y
Z
Creating Channel Advantage
Exploiting channel variations (fading)
Opportunistic transmissions
![Page 21: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/21.jpg)
FOR UMD USE ONLY
Creating Channel Advantage
Use of multiple antennas
Spatial diversity
A
B
E
X
Y
Z
![Page 22: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/22.jpg)
FOR UMD USE ONLY
A
B
C
E
Cooperation for Security
Cooperation using (or without using) overheard signals.
![Page 23: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/23.jpg)
FOR UMD USE ONLY
A
B
E
C
D
Secure Broadcasting
Secure broadcasting to multiple end-usersin the presence of one or more adversarial nodes.
![Page 24: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/24.jpg)
FOR UMD USE ONLY
A
B
C
Varying Security Clearance Levels
Both B and C are friendly nodes, but they have different security clearances.
We can send secure information to B (un-decodable by C), and visa versa.
![Page 25: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/25.jpg)
FOR UMD USE ONLY
A
D
B
C
Untrusted (but Friendly) Relays
Nodes B and C relay information without being able to decode its content.
![Page 26: Physical Layer Security - UMIACS … · FOR UMD USE ONLY Conclusions Physical-layer security is powerful: no limitation on adversary’s computation power or available information](https://reader034.vdocument.in/reader034/viewer/2022051717/5a7080e17f8b9ab1538c0826/html5/thumbnails/26.jpg)
FOR UMD USE ONLY
Conclusions
Physical-layer security is powerful:no limitation on adversary’s computation power or available informationprovable, quantifiable (bits/sec/hertz) and implementable
Many open problems:explicit code constructionsimplementing in the existing infrastructurebetter modeling adversary – e.g., active adversariesrobust modeling of adversary – e.g., no CSIcombining with cryptography…
Contact me with questions/comments/ideas:Sennur Ulukus [email protected] http://www.ece.umd.edu/~ulukus