Enhancing Wireless Security with Physical Layer Network Cooperation

Similar documents
Physical Layer Security in Wireless Communications

Multiuser Communications in Wireless Networks

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks

PHYSICAL LAYER SECURITY IN WIRELESS NETWORKS: INTELLIGENT JAMMING AND EAVESDROPPING

MIMO CHANNEL CAPACITY

Degrees of Freedom in Wireless Networks

Network Security A Decision and Game-Theoretic Approach

Capacity Limits of MIMO Channels

A survey on Spectrum Management in Cognitive Radio Networks

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 8, AUGUST If the capacity can be expressed as C(SNR) =d log(snr)+o(log(snr))

Game Theory Based Load Balanced Job Allocation in Distributed Systems

350 Serra Mall, Stanford, CA

Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; HitB; 28 May 2015

How To Protect A Massive Input Multiple Output (Mamimo) System From Eavesdropping And Active Attacks

Predictive Scheduling in Multi-Carrier Wireless Networks with Link Adaptation

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

MIMO Antenna Systems in WinProp

Mobile Wireless Access via MIMO Relays

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels,

Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks

Physical Layer Research Trends for 5G

Simple Channel-Change Games for Spectrum- Agile Wireless Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Game Theory in Wireless Networks: A Tutorial

WIRELESS communication channels have the characteristic

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

Bargaining Solutions in a Social Network

Cooperative Communication in Wireless Networks

Physical Layer Security in Wireless Networks

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

The Security of Physical Layer in Cognitive Radio Networks

SURVEY OF LTE AND LTE ADVANCED SYSTEM

MIMO: What shall we do with all these degrees of freedom?

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

A Network Flow Approach in Cloud Computing

Multi-radio Channel Allocation in Multi-hop Wireless Networks

Power Control is Not Required for Wireless Networks in the Linear Regime

Game Theory Meets Network Security and Privacy

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

8 MIMO II: capacity and multiplexing

Evolution of the Air Interface From 2G Through 4G and Beyond

Modern Wireless Communication

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

On the Interaction and Competition among Internet Service Providers

IEEE ac in Service Provider Wi-Fi Deployments: Consider More Than Speed

CHAPTER 1 INTRODUCTION

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

Diversity and Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Network Security Validation Using Game Theory

Propsim enabled Mobile Ad-hoc Network Testing

Project Report on Adaptive Resource Allocation Algorithm for Multiuser Mimo-Ofdm Systems:

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Prediction of DDoS Attack Scheme

Coding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels

Decentralized Utility-based Sensor Network Design

Efficient Load Balancing Routing in Wireless Mesh Networks

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2

EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC

Publications. Camilla Hollanti Department of Mathematics Aalto University, Finland December 1, 2011

Wireless Sensor Networks Chapter 14: Security in WSNs

MULTIHOP cellular networks have been proposed as an

Dynamic Multi-User Load Balancing in Distributed Systems

Department of Electrical and Electronics Engineering, Antalya International University, Döşemealtı, Antalya, Turkey

Complexity Reduction of Matrix Manipulation for Multi-User STBC-MIMO Decoding

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

Equilibrium computation: Part 1

Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam

Multimedia Data Transmission over Wired/Wireless Networks

Transcription:

Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer

Outline Background Game Theory for Dual-Mode Adversaries Adversary can act as either link eavesdropper or jammer Transmitter can allocate power to jamming as well Derived conditions for Nash equilibria in resulting two-player game Examples Transmitter Cooperation for Secrecy in Interference Channels Maintain secrecy of co-channel links Cooperation through CSI sharing and artificial noise alignment Examples Impact of Malicious Feedback in the Physical Layer Fair downlink resource allocation schemes susceptible to malicious users Fraudulent feedback from a single user can cause significant degradation Example Future directions

Background The MIMO Wiretap Channel Alice Bob Eve Two possible scenarios: (1) CSI for Eve is known: Generalized Singular Value Decomposition (GSVD) (2) CSI for Eve is unknown: Artificial noise (jamming)

Dual-Mode Adversary Suppose Eve can either eavesdrop Alice Bob Eve or jam Alice Bob Eve Which should she do to minimize the secrecy rate? What should Alice do in response, transmit artificial interference of her own or not? Is there an equilibrium strategy for Alice and Eve?

Dual-Mode Adversary Strategic Game Theory Formulation Two-player matrix, use secrecy rate as utility function Zero-sum formulation, where Eve s payoff is negative of Alice s CSI assumptions: Alice knows, Eve knows, all other channels assumed to be zero-mean i.i.d. Gaussian Eavesdrop EVE Jam ALICE Full power Artificial noise

Strategic Game Theory Formulation (cont.) Eavesdrop EVE Jam ALICE Full power Artificial noise Clearly, we have (Eve cannot simultaneously jam and eavesdrop) (artificial noise helps w/ eavesdroppers) (A,E) is Nash equilibrium if

Strategic Game Theory Formulation (cont.) Eavesdrop EVE Jam ALICE Full power Artificial noise Clearly, we have (Eve cannot simultaneously jam and eavesdrop) (artificial noise helps w/ eavesdroppers) (A,E) is Nash equilibrium if (F,J) is Nash equilibrium if

Strategic Game Theory Formulation (cont.) Eavesdrop EVE Jam ALICE Full power Artificial noise Clearly, we have (Eve cannot simultaneously jam and eavesdrop) (artificial noise helps w/ eavesdroppers) (A,E) is Nash equilibrium if (F,J) is Nash equilibrium if We have derived the conditions under which these equilibria occur

Example Nash Equilibrium for Dual-Mode Adversary Eve closer to Alice than Bob in this scenario, equal background noise power, thus equilibrium for never occurs region for Nash equilibrium Theoretical prediction accurately matches conditions for equilibrium when

Extensive Game Theory Formulation In the strategic formulation of the game, both players move simultaneously. In the extensive formulation, one player moves first and the other then responds. For example, in a two-step game, we have two possible decision trees: Eve Alice Alice Eve Solution found by working upwards, the player at a given level choosing the best strategy for each subtree on that level. For example: Alice Eve

Extensive Game Theory Formulation In the strategic formulation of the game, both players move simultaneously. In the extensive formulation, one player moves first and the other then responds. For example, in a two-step game, we have two possible decision trees: Eve Alice Alice Eve Solution found by working upwards, the player at a given level choosing the best strategy for each subtree on that level. For example: Alice Eve

Extensive Game Theory Formulation In the strategic formulation of the game, both players move simultaneously. In the extensive formulation, one player moves first and the other then responds. For example, in a two-step game, we have two possible decision trees: Eve Alice Alice Eve Solution found by working upwards, the player at a given level choosing the best strategy for each subtree on that level. For example: Alice Eve

Example Nash Equilibrium and Extensive Game Results As before, theory accurately predicts situation for Nash equilibrium In equilibrium region, extensive game results in equilibrium solution Outside equilibrium region, advantage of moving second is evident Eve region for Nash equilibrium

Outline Background Game Theory for Dual-Mode Adversaries Adversary can act as either link eavesdropper or jammer Transmitter can allocate power to jamming as well Derived conditions for Nash equilibria in resulting two-player game Examples Transmitter Cooperation for Secrecy in Interference Channels Maintain secrecy of co-channel links Cooperation through CSI sharing and artificial noise alignment Examples Malicious Feedback in the MIMO Downlink Fair downlink resource allocation schemes susceptible to malicious users Fraudulent feedback from a single user can cause significant degradation Examples Future directions

Secrecy in Interference Channels two co-channel wireless links receiver for link 1 is a potential eavesdropper for link 2, and vice versa can be thought of as two wiretap channels in parallel we examine both cooperative and non-cooperative transmission strategies for secrecy in the general MIMO case cooperation here includes (1) the sharing of CSI between transmitters, (2) the design of beamformers for artificial noise alignment, and (3) bargaining between transmitters to determine noise levels

Non-Cooperative Jamming (NCJ) in this non-cooperative approach, transmitters only know the direct channel to their desired receiver, either or only option in this case is for both transmitters to employ artificial noise secrecy rate region found by calculating rate points for all possible transmit power allocations (including fraction of power devoted to noise)

GSVD-Based Beamforming both direct and cross channels assumed to be known; transmitter 1 knows, transmitter 2 knows. Each implements GSVD approach independent of the other also non-cooperative, since algorithm cannot account for interference of transmitter 1 s signal with transmitter 2 s signal at receiver 2, and vice versa secrecy rate region found by calculating rate points for all possible transmit power allocations (no jamming in this case)

Cooperative Interference Alignment Idea: Calculate GSVD beamformers, then allocate power to artificial noise that will be (approximately) aligned with information signal from other transmitter. Transmitters must share information signal subspaces.

GSVD + Artificial Noise Alignment (ANA) Algorithm Algorithm for Transmitter 1 (1) Calculate GSVD for generalized singular values > 1 (2) Find beamformers for artificial noise that is approximately aligned with transmitter 2 s information signal and orthogonal to transmitter 1 s signal: (3) Transmitters now negotiate to determine how much power each will devote to artificial interference. Here we use a game-theoretic bargaining approach.

Two-User Bargaining Games Graphical Interpretation Convex hull of rate points obtained for all possible yields the set of achievable secrecy rates. Goal is to find an acceptable operating point on the Pareto frontier. convex set of achievable secrecy rates Operating point should be an acceptable tradeoff between overall performance (sum sec. rate) and fairness (min sec. rate). K-S solution provides each user the same fraction of their max secrecy rate.

Example Secrecy Rates for Interference Channel Link 1 is slightly handicapped, with one fewer transmit antennas Cooperation provides significant gains in secrecy rate, especially for link 1

Outline Background Game Theory for Dual-Mode Adversaries Adversary can act as either link eavesdropper or jammer Transmitter can allocate power to jamming as well Derived conditions for Nash equilibria in resulting two-player game Examples Transmitter Cooperation for Secrecy in Interference Channels Maintain secrecy of co-channel links Cooperation through CSI sharing and artificial noise alignment Examples Malicious Feedback in the MIMO Downlink Fair downlink resource allocation schemes susceptible to malicious users Fraudulent feedback from a single user can cause significant degradation Examples Future directions

MIMO Downlink Resource Allocation UE BS UE UE UE downlink power/beamformer assignment to guarantee fair network QoS based on feedback ( ) from user terminals a user terminal may attempt to degrade network performance by sending fraudulent feedback, forcing the basestation to allocate more resources to it, and hence reducing those available for others in this initial study, we focus on fraudulent feedback mechanisms a malicious user may employ in a multicast scenario

Problem Setup

Example: Max-Min Transmitter Strategy Suppose transmitter s strategy is to maximize minimum link SNR: While falsely reporting is easily detected would be sufficient, such a naïve approach Instead, assume malicious user adopts the following approach: Solution can be found a series of sequential quadratic programs

Example: Max-Min Transmitter Strategy

Future Directions Strategies for detecting fraudulent feedback in the physical layer - exploiting channel temporal correlation - channel tracking/prediction - multiuser diversity, variations in channel norm Sensitivity and robustness of interference channel algorithms, effects of imperfect CSI and development of robust beamformers Secrecy for one- and two-way relay channels, benefit of inactive nodes providing jamming support Dual-adversary scenarios for more complicated network topologies (interference channels, relay & helper configurations, etc.) Experimental evaluation of point-to-point and cooperative jamming approaches (joint with Michael Jensen)

Publications Since Last Review A. Mukherjee and A. Swindlehurst, "Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI," IEEE Trans. on Signal Processing, 2011 (to appear). A. Fakoorian and A. Swindlehurst, "Optimal Power Allocation for GSVD-Based Beamforming in the MIMO Wiretap Channel," submitted to IEEE Trans. on Information Theory, 2010. A. Fakoorian and A. Swindlehurst, "MIMO Interference Channel with Confidential Messages: Achievable Secrecy Rates and Beamforming Design," submitted to IEEE Trans. on Info. Forensics and Security, 2010. A. Mukherjee and A. Swindlehurst, "Utility of Beamforming Strategies for Secrecy in Multiuser MIMO Wiretap Channels," In Proc. 47th Allerton Conf. on Communication, Control and Computing, October, 2009. T.-H. Kim, D. Tipper, P. Krishnamurthy and A. Swindlehurst, "Improving the Topological Resilience of Mobile Ad Hoc Networks," In Proc. 7 th IEEE Int l Workshop on Design of Reliable Comm. Networks, October, 2009. A. Mukherjee and A. Swindlehurst, "User Selection in Multiuser MIMO Systems with Secrecy Considerations," In Proc. 43rd Asilomar Conference on Signals, Systems, and Computers, November, 2009. J. Wang and A. Swindlehurst, "Cooperative Jamming in MIMO Ad-Hoc Networks," In Proc. 43rd Asilomar Conference on Signals, Systems, and Computers, November, 2009. A. Mukherjee and A. Swindlehurst, "Poisoned Feedback: The Impact of Malicious Users in Closed-Loop Multiuser MIMO Systems," In Proc. 2010 IEEE ICASSP, March, 2010. A. Mukherjee and A. Swindlehurst, "Equilibrium Outcomes of Dynamic Games in MIMO Channels with Active Eavesdroppers," In Proc. IEEE International Conf. on Communications, May, 2010. A. Mukherjee and A. Swindlehurst, "Ensuring Secrecy in MIMO Wiretap Channels with Imperfect CSIT: A Beamforming Approach," In Proc. IEEE International Conf. on Communications, Cape Town, May, 2010. A. Mukherjee and A. Swindlehurst, "Securing Multi-Antenna Two-Way Relay Channels with Analog Network Coding Against Eavesdroppers," In Proc. 2010 IEEE Worskhop on Signal Processing Advances in Wireless Communications, June, 2010.