Improve physical layer security via cooperation
Ning zhang
1
Improve physical layer security via cooperation Ning zhang 1 - - PowerPoint PPT Presentation
Improve physical layer security via cooperation Ning zhang 1 Outline Outline Physical layer security Ph i l l it Approach based on Multiple antennas Cooperation for security Single cooperative relay (with/without jamming)
Ning zhang
1
2
ireless net orks d e to the open ireless
potentially overhear the transmitted information.
algorithms.
– However, there are difficulties and vulnerabilities associated with key distribution and However, there are difficulties and vulnerabilities associated with key distribution and management. – The implementation of secrecy at higher layers becomes the subject of increasing potential attacks. Sensor or other kind of networks don’t have the seven layers structure and can not – Sensor or other kind of networks don t have the seven layers structure and can not support key or …. Without key – Physical layer security has its own advantages
channels for secure transmission.
3
4
– Eavesdropper is “passive”, i.e., eavesdropper does not transmit any signal with the intention of jamming the destination any signal with the intention of jamming the destination.
the source.
5
6
7
8
When the eavesdropper channel is a degraded version of the main channel, the source and destination can exchange perfectly secure messages at a nonzero rate, while the eavesdropper can learn almost nothing about the messages from its observations messages from its observations.
y y pp single antenna systems is hampered by channel conditions: if the channel between source and destination is worse than the channel between source and eavesdropper the secrecy capacity is typical zero and eavesdropper, the secrecy capacity is typical zero .
9
the secret message that it is transmitting.
g y pp the intended receiver.
10
receiver (B) and the eavesdropper (E) are, respectively,
g y p Gaussian distributed artificial noise .
Then, the secrecy capacity is given by
11
– Non-direct links: The direct links S→D and S →E are not available(deep fading) and thus communication is performed via the relay nodes. g) p y Eavesdropper cannot overhear the broadcast channel but only the cooperative channel. – Clustered applications: The source and there lays are located in the same cluster, Clustered applications: The source and there lays are located in the same cluster, while destination and eavesdropper are located outside the cluster.
12
13
This solutions does not take into account the eavesdropper channels This solutions does not take into account the eavesdropper channels
) p ( ) This solution takes into account the relay-eavesdroppers links (global instantaneous knowledge for all the links)
3) Suboptimal selection(SS): Only average channel knowledge for the eavesdropper link is available
14
For high SNR cases
15
Two phases and the power of the message signal s0 is normalized to one, i.e, E{|s0|2} = 1. E{|s0| } 1. ai baseband complex channel gain between the S and the ith cluster node i, hi channel gain between the ith cluster node and the D, gi j channel gain between the ith cluster node and the jth E gi,j channel gain between the ith cluster node and the jth E.
16
relays within the cluster. The received signal at the ith relay node is xi
hi h d i i i h d i l f h this stage. For the source node, it transmits a weighted signal of the noiseless signal s0, i.e., w0s0; for the ith relay, it transmits a weighted version of the received noisy signal in Stage 1, i.e., wixi, and wi represents the weight the weight of the ith cluster node.
17
where where
18
where
The secrecy capacity for jth eavesdroppers is defined
19
where
20
21