Channel-Independent Viterbi Algorithm (CIVA) for DNA

Download Report

Transcript Channel-Independent Viterbi Algorithm (CIVA) for DNA

MIMO Transmissions with Information
Theoretic Secrecy for Secret-Key
Agreement in Wireless Networks
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
1Department
of Electrical and Computer Engineering
State University of New York at Binghamton
[email protected],
http://ucesp.ws.binghamton.edu/~xli
2Air Force Research Lab, AFRL/IFGB, [email protected]
MILCOM'2005
1
Contents
1.
2.
3.
4.
5.
6.
Introduction
Secure MIMO transmission scheme
Transmission weights design
Transmission secrecy
Simulations
Conclusions
MILCOM'2005
2
1. Introduction
• Secure wireless transmission: necessary
PHY security techniques for wireless
information assurance
– Wireless transmissions have no boundary,
susceptible to listening/analyzing, location,
jamming
– Wireless nodes have severe energy and
bandwidth constraints  “light” techniques
– Unreliable link and dynamic network topology
MILCOM'2005
3
Secure Wireless Transmissions
• Traditional secure transmission design
– Data encryption, spread spectrum, etc
• New idea: use antenna array diversity and
array redundancy
– A completely different approach of secure (LPI)
waveform design
MILCOM'2005
4
Significance to Cryptography
• Provable (information-theoretic) secrecy
– Inherently secure transmission, no encryption keys
involved
– Comparable to quantum cryptography
• Provide PHY-layer LPI, and assist higher layer
data encryption
– PHY-layer assisted secret key agreement
MILCOM'2005
5
Secret-Key Agreement
• Classic Shannon model
– Alice & Bob try to exchange encryption keys for
encrypted data transmission
– Eve can acquire all (and identical) messages
received by Alice or Bob
– Perfect secrecy impractical under Shannon model
– Computational secrecy achievable
MILCOM'2005
6
PHY-layer Transmission Secrecy Model
• Information theoretic secrecy realizable with
model different than Shannon’s
– Eve’s channels, and thus received signals, are
different from Alice’s or Bob’s
– A reality in quantum communication, and wireless
transmissions
MILCOM'2005
7
Information-Theoretic Secrecy
• Wyner’s wire-tap channel: secret capacity
 h (  )  h (  ),
C1  
0,

w here
if    (Eve' s channel
else (Eve' channel
noiser)
better)
h ( p )   p log p  (1  p ) log( 1  p )
• Maurer’s common information concept
C 2  h (     2  )  h (  )
• High secret channel capacity requires Eve’s channel
being noisier  not practical enough
MILCOM'2005
8
2. Secure MIMO transmission scheme
• Can we guarantee a large  or    in
practice?
• Possible: randomized MIMO transmission
• Basic idea:
– Use redundancy of antenna array
– Exploit the limit of blind deconvolution
• Eve can not estimate channel/symbol blindly
MILCOM'2005
9
Transmission Scheme
• Alice: antenna array (secure, public, pilot)
– Does not send training signals
• Bob: estimate symbols, no channel knowledge
required
MILCOM'2005
10
Signal Model and Assumptions
B ob receives: x ( n )  H W ( n ) b ( n )  v ( n )
E ve receives: x u ( n )  H u W ( n ) b ( n )  v u ( n )
Alice, Bob & Eve do not know channels.
– Alice estimate H by reciprocity
– Bob need not know channel.
– Eve depends on blind estimation.
MILCOM'2005
11
MIMO Transmission Procedure
• Alice select transmit antenna weights so that
H W (n)  A :
A is K  K diagonal w ith positive elem ents
• Bob receives signal x ( n )  A b ( n )  v ( n )
– By estimating received signal power, Bob can detect
signals
ˆb ( n )  A  1 x ( n )
• Key points:
– No channel information required for Bob, no training
required  no training available to Eve
– Redundancy in selecting weights W ( n )
MILCOM'2005
12
3. Transmission Weights Design
• Existing array transmission schemes are
susceptible to Eve’s blind deconvolution attack?
– Eve can easily estimate b ( n ) by blind deconvolution
if with optimal transmit beamforming
W opt ( n )  V opt
H
 D 1U
opt
opt A opt


B
w here H  U opt  D opt ,

0  V opt

H

,

, A opt  I K /

tr D
2

and B can be zero or random
MILCOM'2005
13
Select Weights with Randomization
• W1(n): Redundancy in transmitting weights
 H 1  A  H W ( n ) 
1 1
W (n)   0
,
W1 ( n )


w here H   H 0
H 1 
• Procedure:
In each sym bol block interval, select ra ndom ly W 1 ( n ) such that
s1 ( n )  W1 ( n ) b ( n )
~
N
J K
and then calculate transm itted vector
( μ ,  ),
W ( n ) b ( n ) as
1
 s 0 ( n )   H 0  A b ( n )  H 1s 1 ( n )  
s(n)  

 
s
(
n
)
s
(
n
)
 1
 
1

MILCOM'2005
14
4. Transmission Secrecy
• Eve’s received signal becomes
x u ( n )   H u F
 s1 ( n ) 
I M  
  Huf ,
v
(
n
)
 u

  H 1H 
0
1
w here F  
,
 I J  K 
 H 1A b (n ) 
f   0

0


which has distribution
xe (n) ~ N
M
(H u F μ  H u f , H u F  F
H
Hu
H
2
  v IM )
• Objective: Eve can not estimate channel Hu from
xe(n), which relies on
– Assumption that Eve & Bob’s channels are sufficiently
different  wireless channels fade independently when
separated a fractional of wavelength
– Unknown to Eve: s1 ( n )  W1 ( n ) b ( n ) ~ N J  K ( μ ,  ),
MILCOM'2005
15
Indeterminacy of Blind Channel Estimation
• Proposition:
For unknow n sym bol b ( n ) and unknow n H , μ , Σ ,
from the distribution of x u ( n ), the chann el m atrix H u
is indistinguishable from H u P w ith J  J am b uiguity
m atrix
U
P  
0
GV  UG 
.
V

MILCOM'2005
16
Indeterminacy of Blind Symbol Estimation
• Proposition:
A ssum e x u ( n ) is generated by transm itting b ( n ).
T hen x u ( n ) has identical distribution as those generated
by transm itting any other sym bol vector d ( n ).
• Result:
– Eve’s error rate: high
– Bob’s error rate: low (identical to optimal MIMO
eigen-beamforming)
– Cost paid: higher transmission power
MILCOM'2005
17
Transmission secrecy
• Weights are selected randomly and unknown to
Eve, blind deconvolution is made impossible
• Weights are selected by Alice, no need to tell
Bob  equivalently one-time pad
• Information theory guarantees high and positive
secret channel capacity  provable
(information theoretic) secrecy
MILCOM'2005
18
Eve’s Exhaustive Search Attack
• Eve may exhaustively try all possible channels
(both H u , and H ).
2K
2(J K )
Q

Q
• The complexity can be at least
,
according to quantization level Q
2
2
– Low quantization level reduces complexity, but
increases symbol estimation error  still makes
high positive secret channel capacity possible
– Example,
2
128
when J  4, K  4, Q  16 (for   0.1).
MILCOM'2005
19
5. Simulations
J=6.
K=4.
QPSK.
• BER of the proposed transmission scheme
MILCOM'2005
20
• Secret channel capacity with the simulated BER
MILCOM'2005
21
Conclusions
• Proposed a randomized MIMO transmission
scheme
– Use array redundancy and channel diversity for
transmission security
– Enhance transmission LPI in the PHY-layer by
increasing the adversary’s receiving error
– Proof of secrecy with weight randomization and limit
of blind deconvolution
MILCOM'2005
22