Improve physical layer security via cooperation Ning zhang 1 - - PowerPoint PPT Presentation

improve physical layer security via cooperation
SMART_READER_LITE
LIVE PREVIEW

Improve physical layer security via cooperation Ning zhang 1 - - PowerPoint PPT Presentation

Improve physical layer security via cooperation Ning zhang 1 Outline Outline Physical layer security Ph i l l it Approach based on Multiple antennas Cooperation for security Single cooperative relay (with/without jamming)


slide-1
SLIDE 1

Improve physical layer security via cooperation

Ning zhang

1

slide-2
SLIDE 2

Outline Outline

Ph i l l it

  • Physical layer security
  • Approach based on Multiple antennas
  • Cooperation for security

– Single cooperative relay (with/without jamming) M l i l i l – Multiple cooperative relays

  • Conclusion

2

slide-3
SLIDE 3

Physical layer security Physical layer security

  • SECURITY is a critical concern in

ireless net orks d e to the open ireless

  • SECURITY is a critical concern in wireless networks due to the open wireless
  • medium. Any receiver within the range of a wireless transmission can

potentially overhear the transmitted information.

  • Security against eavesdropping can be achieved by using cryptographic

algorithms.

– However, there are difficulties and vulnerabilities associated with key distribution and However, there are difficulties and vulnerabilities associated with key distribution and management. – The implementation of secrecy at higher layers becomes the subject of increasing potential attacks. Sensor or other kind of networks don’t have the seven layers structure and can not – Sensor or other kind of networks don t have the seven layers structure and can not support key or …. Without key – Physical layer security has its own advantages

  • Physical layer security, which exploits the physical characteristics of wireless

channels for secure transmission.

3

slide-4
SLIDE 4

Physical layer security Physical layer security

4

slide-5
SLIDE 5

Physical layer security Physical layer security

St di d f t ith “k l ” it (f PHY

  • Studied for systems with “key-less” security (from a PHY

aspect).

  • In the above system with a source, destination and

y , eavesdropper.

– Eavesdropper is “passive”, i.e., eavesdropper does not transmit any signal with the intention of jamming the destination any signal with the intention of jamming the destination.

– Eavesdropper only “listens” to the information transmitted by

the source.

  • The channel between the source and destination is called the

“main channel”.

  • The channel between the source and eavesdropper is called
  • The channel between the source and eavesdropper is called

the “eavesdropper channel”.

5

slide-6
SLIDE 6

Physical layer security Physical layer security

  • Is it possible for the source to transmit in such

a way that the information can be received y properly by the destination but not by the eavesdropper? eavesdropper?

  • This question is answered by measuring the

“secrecy capacity” secrecy capacity

6

slide-7
SLIDE 7

Physical layer security Physical layer security

S i i h diff f h l

  • Secrecy capacity is the difference of the mutual

information between the transmitter and the intended i h d receiver versus the eavesdropper.

  • Secrecy capacity can be computed the difference

between the Shannon capacity of the main channel and that of the eavesdropper channel.

7

slide-8
SLIDE 8

Physical layer security Physical layer security

  • Let the Signal-to-Noise ratio (SNR) seen by the destination be

and that seen by the eavesdropper be . Th S it f th b t

  • The Secrecy capacity, , for the above system

with bandwidth is given by where

8

slide-9
SLIDE 9

Physical layer security Physical layer security

  • When the eavesdropper channel is a degraded version of the main channel

When the eavesdropper channel is a degraded version of the main channel, the source and destination can exchange perfectly secure messages at a nonzero rate, while the eavesdropper can learn almost nothing about the messages from its observations messages from its observations.

  • The feasibility of traditional PHY-based security approaches based on

y y pp single antenna systems is hampered by channel conditions: if the channel between source and destination is worse than the channel between source and eavesdropper the secrecy capacity is typical zero and eavesdropper, the secrecy capacity is typical zero .

9

slide-10
SLIDE 10

Multiple antennas Multiple antennas

  • The key idea is that a transmitter can generate noise artificially to conceal

the secret message that it is transmitting.

  • The noise is generated such that only the eavesdropper is affected but not

g y pp the intended receiver.

10

slide-11
SLIDE 11

Multiple antennas Multiple antennas

  • The transmitter transmit xk at time k. The signals received by the legitimate

receiver (B) and the eavesdropper (E) are, respectively,

  • where uk is the desired signal and wk is a statistically independent,

g y p Gaussian distributed artificial noise .

  • Here, wk is chosen such that
  • Then, the secrecy capacity is given by

Then, the secrecy capacity is given by

11

slide-12
SLIDE 12

One cooperative relay One cooperative relay

  • Assumptions:

– Non-direct links: The direct links S→D and S →E are not available(deep fading) and thus communication is performed via the relay nodes. g) p y Eavesdropper cannot overhear the broadcast channel but only the cooperative channel. – Clustered applications: The source and there lays are located in the same cluster, Clustered applications: The source and there lays are located in the same cluster, while destination and eavesdropper are located outside the cluster.

12

slide-13
SLIDE 13

One cooperative relay One cooperative relay

  • The selected relay increases the perfect secrecy of the relaying

link . Th l d j i i f h d

  • The selected jammer increases interference at the eavesdropper

node to decrease the capacity of eavesdropper link.

13

slide-14
SLIDE 14

One cooperative relay One cooperative relay

  • A. Selection techniques without jamming(a conventional relay)
  • 1) Conventional selection(CS):

This solutions does not take into account the eavesdropper channels This solutions does not take into account the eavesdropper channels

  • 2) Optimal selection(OS):

) p ( ) This solution takes into account the relay-eavesdroppers links (global instantaneous knowledge for all the links)

  • 3) Suboptimal selection(SS):

3) Suboptimal selection(SS): Only average channel knowledge for the eavesdropper link is available

14

slide-15
SLIDE 15

One cooperative relay One cooperative relay

Relay and jammer selection

For high SNR cases

15

slide-16
SLIDE 16

Multiple cooperative relays Multiple cooperative relays

Two phases and the power of the message signal s0 is normalized to one, i.e, E{|s0|2} = 1. E{|s0| } 1. ai baseband complex channel gain between the S and the ith cluster node i, hi channel gain between the ith cluster node and the D, gi j channel gain between the ith cluster node and the jth E gi,j channel gain between the ith cluster node and the jth E.

16

slide-17
SLIDE 17

Multiple cooperative relays Multiple cooperative relays

  • Phase1: The source broadcasts its message signal s0 locally to its trusted

relays within the cluster. The received signal at the ith relay node is xi

  • Phase 2: Both the source node and all the N−1 trusted relays participate in

hi h d i i i h d i l f h this stage. For the source node, it transmits a weighted signal of the noiseless signal s0, i.e., w0s0; for the ith relay, it transmits a weighted version of the received noisy signal in Stage 1, i.e., wixi, and wi represents the weight the weight of the ith cluster node.

17

slide-18
SLIDE 18

Multiple cooperative relays Multiple cooperative relays

  • The received signal at the destination equals
  • Using maximal ratio combining (MRC), the capacity at the destination is

where where

18

slide-19
SLIDE 19

Multiple cooperative relays Multiple cooperative relays

  • The received signal at the jth eavesdropper equals
  • The received signal at the jth eavesdropper equals
  • The capacity at the jth eavesdropper is then

where

  • The secrecy capacity for jth eavesdroppers is defined

The secrecy capacity for jth eavesdroppers is defined

  • Design weights to maximize the secrecy capacity

19

where

slide-20
SLIDE 20

Conclusion Conclusion

  • Physical layer security
  • Approaches based on multiple antennas and cooperation are

d proposed.

  • The main objective of these techniques is to boost the capacity
  • f the main channel and decrease the capacity of the
  • f the main channel and decrease the capacity of the

eavesdropper channel, simultaneously .

20

slide-21
SLIDE 21

Th k Thanks

21