A Randomized Space-Time Transmission Scheme for Secret-Key Agreement - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

A Randomized Space-Time Transmission Scheme for Secret-Key Agreement

Description:

Eve can acquire all (and identical) messages received by Alice or Bob ... Eve's channels, and thus received signals, are different from Alice's or Bob's ... – PowerPoint PPT presentation

Number of Views:53
Avg rating:3.0/5.0
Slides: 28
Provided by: xli5
Category:

less

Transcript and Presenter's Notes

Title: A Randomized Space-Time Transmission Scheme for Secret-Key Agreement


1
A Randomized Space-Time Transmission Scheme for
Secret-Key Agreement
  • Xiaohua (Edward) Li1, Mo Chen1 and E. Paul
    Ratazzi2
  • 1Department of Electrical and Computer
    Engineering
  • State University of New York at Binghamton
  • xli, mchen0_at_binghamton.edu,
  • http//ucesp.ws.binghamton.edu/xli
  • 2Air Force Research Lab, AFRL/IFGB,
    paul.ratazzi_at_afrl.af.mil

2
Major Contributions
  • Develop new wireless security schemes with
    unconditional secrecy
  • Provide a practical solution for the interesting
    challenge in information theory Wyners wire-tap
    channel for perfect secrecy
  • Propose cross-layer security designs, integrating
    redundancy of space-time transmission, limit of
    blind deconvolution, and secret key distribution

3
Contents
  1. Introduction
  2. Randomized space-time transmission scheme
  3. Transmission weights design
  4. Trade power for secrecy
  5. Simulations
  6. Conclusions

4
Introduction
  • Secret-key agreement
  • Classic Shannon model
  • Alice Bob try to exchange encryption keys for
    encrypted data transmission
  • Eve can acquire all (and identical) messages
    received by Alice or Bob
  • Perfect secrecy impractical under Shannon model
  • Computational secrecy achievable
  • Based on some intractable computation problem
  • Intractability unproven

5
Perfect Secrecy
  • Perfect secrecy significant theoretically,
    important practically
  • Increased computing power, new computation
    concepts (such as Quantum computer) are
    challenging computational secrecy schemes
  • Ways for achieving perfect secrecy
  • Quantum communications quantum secrecy
  • Wireless transmissions (possibly)
    information-theoretical secrecy

6
Wireless Secrecy
  • Quantum secrecy
  • Successful, but unknown of wireless network
    applications
  • Unconditional wireless secrecy
  • Provide an alternative to quantum secrecy for
    network key management
  • Target to the wide spread of wireless
    communications and wireless networks
  • Objective
  • Design information-theoretically secret wireless
    transmission schemes

7
New Secrecy Model
  • Perfect secrecy realizable with model different
    than Shannons
  • Eves channels, and thus received signals, are
    different from Alices or Bobs
  • A reality in quantum communication, and wireless
    transmissions

8
Background of Information-Theoretic Secrecy A.
D. Wyners wire-tap channel (1975)
  • Secret channel capacity from Alice to Bob
  • Positive secret channel capacity requires Eves
    channel being noisier ? not practical enough
  • Theoretically significant
  • Widely referred
  • One of his major contributions

9
Background of Information-Theoretic Secrecy U.
Maurer Common Information (1993,2003)
  • Alice Bob exchange information by public
    discussion, secret channel capacity increases to
  • Large capacity requires Eve have large error rate
    ? still not practical enough

10
2. Randomized Space-Time Transmission
  • Can we guarantee a large or in
    practice?
  • Possible randomized space-time transmission
  • Basic idea
  • Use redundancy of antenna array to create a
    difficult blind deconvolution problem
  • Exploit the limit of blind deconvolution
  • Eve can not estimate channel/symbol blindly

11
Transmission Scheme
  • Alice antenna array (secure, public, pilot)
  • Does not send training signals
  • Bob estimate symbols, no channel knowledge

12
Signal Model and Assumptions
Alice, Bob Eve do not know channels. Alice
estimate h by reciprocity. Eve depends on blind
channel estimation.
13
3. Transmission Weights Design
  • Alice select proper weights so that
  • Bob receives signal
  • By estimating received signal power, Bob can
    detect signals
  • Key points
  • No channel information required for Bob, no
    training required ? no training available to Eve
  • Redundancy in selecting weights

14
Blind Deconvolution Attack
  • Why do we need randomized array transmission?
  • Eve can easily estimate by blind
    deconvolution methods otherwise
  • Examples with optimal transmit beamforming

15
Select Weights with Randomization
  • Objective choose transmitting weights so that
  • Procedure

16
4. Trade-off Power and Secrecy
  • Eves received signal becomes
  • Secrecy relies on
  • Assumption that Eve Bobs channels are
    sufficiently different ? wireless channels fade
    independently when separated a fractional of
    wavelength
  • Eve can not estimate channels blindly
  • Eves knowledge on
    is useless

17
Secrecy Against Blind Deconvolution Attack
  • Blind deconvolution requires strong source
    statistical properties,
  • Example known distribution, independence,
    non-Gaussian distribution, distinct power
    spectral
  • Weights are selected randomly and unknown to Eve,
    blind deconvolution property can all be violated
  • Example can have a distribution
    unknown to Eve, with certain mean and variance
  • Weights are selected by Alice, no need to tell
    Bob ? equivalently one-time pad

18
Secrecy Under Known
  • Randomization eliminates the possibility of
    exploiting such information
  • We have been able to show

19
Information-Theoretic Secrecy
  • The ambiguity for Eve when estimating channel and
    symbols increases her error rate
  • Bobs error rate is due to noise and
    Alices channel knowledge mismatch. It can be
    much less than Eves error rate
  • Information theory guarantees high and positive
    secret channel capacity ? information theoretic
    secrecy
  • Ways for implementing secret-key agreement
    protocol remains unknown

20
Complexity of Exhaustive Attack
  • Eve may exhaustively estimate channels
    (both ).
  • The complexity can be at least ,
    according to quantization level
  • Low quantization level reduces complexity, by
    increases symbol estimation error ? still makes
    high positive secret channel capacity possible
  • Example,
  • Complexity can be much higher with MIMO and
    space-time transmissions

21
Trade-off in Transmission Power
  • Cost of realizing secrecy increased transmission
    power
  • transmission rate is not traded
  • Transmission power has to be controlled to avoid
    the possibility of blind deconvolution
  • One transmitting antenna with dominating
    transmission power should be avoided

22
Transmission Power
  • Assume weights have zero mean

23
5. Simulations
  • BER of the proposed transmission scheme

24
  • Secret channel capacity with the simulated BER

25
Analysis Results on Transmission Power
  • Choice of parameters changes power

26
Simulation Results on Transmission Power
  • Total transmission power and the power of a
    single transmitter

27
Conclusions
  • Propose a randomized array transmission scheme
    for wireless secret-key agreement
  • Enhance information-theoretic secret channel
    capacity by increasing the adversarys receiving
    error
  • Demonstrate that information-theoretic secrecy
    concept may be practical based on space-time
    transmissions and the limit of blind deconvolution
Write a Comment
User Comments (0)
About PowerShow.com