Physical Layer Security in Wireless Networks



Similar documents
CSci 530 Midterm Exam. Fall 2012

Enhancing Wireless Security with Physical Layer Network Cooperation

CPSC 467: Cryptography and Computer Security

Secure Gateway (EMSG)

Network Communications System. Redefining Intelligent Utility Communications

How To Write A Transport Layer Protocol For Wireless Networks

Physical Layer Security in Wireless Communications

Hadoop Beyond Hype: Complex Adaptive Systems Conference Nov 16, Viswa Sharma Solutions Architect Tata Consultancy Services

MAC Layer Key Hierarchies and Establishment Procedures

Everything you should know about smart meters

CS 464/564 Networked Systems Security SYLLABUS


Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; HitB; 28 May 2015

An Implementation of Public Key Infrastructure Using Wireless Communication Networks

THE FUTURE OF SMART GRID COMMUNICATIONS

Security Issues for the Power Automation Industry in Central/South America. Juan Esteban Hoyos Pareja Timothy X. Brown Mark Dehus

Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Data safety at UXprobe. White Paper Copyright 2015 UXprobe bvba

About the Authors Preface Acknowledgements List of Acronyms

Internet of Things (IoT): A vision, architectural elements, and future directions

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/ Semester 2


Customer Enquiry, Complaint and Dispute Resolution Process

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

4.10 Information Management Policy

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Network Security Protocols

Convergence of Advanced Information and Control Technology in Advanced Metering Infrastructure (AMI) Solution

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Introduction to Oracle Mobile Application Framework Raghu Srinivasan, Director Development Mobile and Cloud Development Tools Oracle

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

Best Practices at Research Level

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!

Model Rules for License-Exempt White Space Devices

Secure Cloud Identity Wallet

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Marketo App Integration in Hootsuite: User Guide

Systematization of Knowledge Lessons Learned From SSL/TLS Attacks

Call Center and Clearing System. ID Technologies Inc

Research on Situation and Key Issues of Smart Mobile Terminal Security

Security Sensor Network. Biswajit panja

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Device-based Secure Data Management Scheme in a Smart Home

Security of smart grid communication protocols

Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels,

WHITE PAPER Security in M2M Communication What is secure enough?

CHAPTER 1 INTRODUCTION

What is an SSL Certificate?

Remaining Anonymous. Osman Surkatty surkatty.org

An Overview of ZigBee Networks

Utilizing big data to bring about innovative offerings and new revenue streams DATA-DERIVED GROWTH

Discrete logarithms within computer and network security Prof Bill Buchanan, Edinburgh Napier

Enabling the SmartGrid through Cloud Computing

White Paper: Librestream Security Overview

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Privacy Patterns in Public Clouds

3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC-2016) March 10-11, 2016 VIT University, Chennai, India

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

3. Designed for installation by the user without further substantial support by the supplier; and

Intranet Security Solution

Security. TestOut Modules

Andree E. Widjaja Jengchung Victor Chen

Flexible Architecture for Internet of Things Utilizing an Local Manager

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Frost & Sullivan. Publisher Sample

The Practical Guide to HIPAA Privacy and Security Compliance

Nexed s Privacy Policy tells you what information we use, collect or disclose to third parties about our users.

How can we use data to offer innovative customer service solutions?

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Everyday Cryptography

Transcription:

Key Techniques for Improving Capacity & Reliability: Multiple-Antenna Systems (MIMO) Cooperation & Relaying Cognitive Radio Physical Layer Security in Wireless Networks

Key Techniques for Improving Capacity & Reliability: Multiple-Antenna Systems (MIMO) Cooperation & Relaying Cognitive Radio What About Security? Physical Layer Security in Wireless Networks

Key Techniques for Improving Capacity & Reliability: Multiple-Antenna Systems (MIMO) Cooperation & Relaying Cognitive Radio What About Security? Traditionally a higher-network-layer issue Physical Layer Security in Wireless Networks

Key Techniques for Improving Capacity & Reliability: Multiple-Antenna Systems (MIMO) Cooperation & Relaying Cognitive Radio What About Security? Traditionally a higher-network-layer issue Encryption can be complex and difficult without infrastructure (e.g, in ad-hoc networks) Physical Layer Security in Wireless Networks

Key Techniques for Improving Capacity & Reliability: Multiple-Antenna Systems (MIMO) Cooperation & Relaying Cognitive Radio What About Security? Traditionally a higher-network-layer issue Encryption can be complex and difficult without infrastructure (e.g, in ad-hoc networks) Information theoretic security characterizes the fundamental ability of the physical layer to provide security (confidentiality) Physical Layer Security in Wireless Networks

Key Techniques for Improving Capacity & Reliability: Multiple-Antenna Systems (MIMO) Cooperation & Relaying Cognitive Radio What About Security? Traditionally a higher-network-layer issue Encryption can be complex and difficult without infrastructure (e.g, in ad-hoc networks) Information theoretic security characterizes the fundamental ability of the physical layer to provide security (confidentiality) Caveat: This is still largely a theoretical issue Physical Layer Security in Wireless Networks

W0 W 1 Receiver 1 Receiver 2 W 0 Receiver 1 Receiver 2 Physical Layer Security in Wireless Networks

Authentication [w/ Lai, El-Gamal IT 09]: Cheating probability is characterized for authentication in noisy channels. Feedback [e.g., w/ Lai, El-Gamal IT 08, w/ Liu, Tang, Spasojevic IT 09 & w/ Kim IT 10]: Judicious use of feedback enhances security. Code Design [e.g., w/ Liu, Liang, Spasojevic IT (under review)]: Nested structure for secure error-control codes for the wire-tap channel. Cross Layer Design Physical Layer Security in Wireless Networks

Many electronic information sources are publicly accessible Google, Facebook, open governance, census, etc. The utility of these sources depends on their accessibility But, they can also leak private information Physical Layer Security in Wireless Networks

Privacy is not secrecy: Physical Layer Security in Wireless Networks

Privacy is not secrecy: An information theoretic characterization: equivocation-distortion [w/ Sankar, Rajagopalan, IT (under review)] Physical Layer Security in Wireless Networks

Privacy is not secrecy: An information theoretic characterization: equivocation-distortion [w/ Sankar, Rajagopalan, IT (under review)] Can consider multiple queries (successive disclosure) & multiple databases (side information) Physical Layer Security in Wireless Networks

Privacy is not secrecy: An information theoretic characterization: equivocation-distortion [w/ Sankar, Rajagopalan, IT (under review)] Can consider multiple queries (successive disclosure) & multiple databases (side information) Application to smart grid: competitive privacy & smart metering [w/ Sankar, Kar, Tandon & w/ Rajagopalan, Sankar, Mohajer SmartGridComm 11] Physical Layer Security in Wireless Networks

Thank You!