Title: MIMO Transmissions with Information Theoretic Secrecy for Secret-Key Agreement in Wireless Networks
1MIMO Transmissions with Information Theoretic
Secrecy for Secret-Key Agreement in Wireless
Networks
- Xiaohua (Edward) Li1 and E. Paul Ratazzi2
- 1Department of Electrical and Computer
Engineering - State University of New York at Binghamton
- xli_at_binghamton.edu,
- http//ucesp.ws.binghamton.edu/xli
- 2Air Force Research Lab, AFRL/IFGB,
paul.ratazzi_at_afrl.af.mil
2Contents
- Introduction
- Secure MIMO transmission scheme
- Transmission weights design
- Transmission secrecy
- Simulations
- Conclusions
31. Introduction
- Secure wireless transmission necessary PHY
security techniques for wireless information
assurance - Wireless transmissions have no boundary,
susceptible to listening/analyzing, location,
jamming - Wireless nodes have severe energy and bandwidth
constraints ? light techniques - Unreliable link and dynamic network topology
4Secure Wireless Transmissions
- Traditional secure transmission design
- Data encryption, spread spectrum, etc
- New idea use antenna array diversity and array
redundancy - A completely different approach of secure (LPI)
waveform design
5Significance to Cryptography
- Provable (information-theoretic) secrecy
- Inherently secure transmission, no encryption
keys involved - Comparable to quantum cryptography
- Provide PHY-layer LPI, and assist higher layer
data encryption - PHY-layer assisted secret key agreement
6Secret-Key Agreement
- Classic Shannon model
- Alice Bob try to exchange encryption keys for
encrypted data transmission - Eve can acquire all (and identical) messages
received by Alice or Bob - Perfect secrecy impractical under Shannon model
- Computational secrecy achievable
7PHY-layer Transmission Secrecy Model
- Information theoretic secrecy realizable with
model different than Shannons - Eves channels, and thus received signals, are
different from Alices or Bobs - A reality in quantum communication, and wireless
transmissions
8Information-Theoretic Secrecy
- Wyners wire-tap channel secret capacity
- Maurers common information concept
- High secret channel capacity requires Eves
channel being noisier ? not practical enough
92. Secure MIMO transmission scheme
- Can we guarantee a large or in
practice? - Possible randomized MIMO transmission
- Basic idea
- Use redundancy of antenna array
- Exploit the limit of blind deconvolution
- Eve can not estimate channel/symbol blindly
10Transmission Scheme
- Alice antenna array (secure, public, pilot)
- Does not send training signals
- Bob estimate symbols, no channel knowledge
required
11Signal Model and Assumptions
- Alice, Bob Eve do not know channels.
- Alice estimate H by reciprocity
- Bob need not know channel.
- Eve depends on blind estimation.
12MIMO Transmission Procedure
- Alice select transmit antenna weights so that
- Bob receives signal
- By estimating received signal power, Bob can
detect signals - Key points
- No channel information required for Bob, no
training required ? no training available to Eve - Redundancy in selecting weights
133. Transmission Weights Design
- Existing array transmission schemes are
susceptible to Eves blind deconvolution attack? - Eve can easily estimate by blind
deconvolution - if with optimal transmit beamforming
14Select Weights with Randomization
- W1(n) Redundancy in transmitting weights
- Procedure
154. Transmission Secrecy
- Eves received signal becomes
- which has distribution
- Objective Eve can not estimate channel Hu from
xe(n), which relies on - Assumption that Eve Bobs channels are
sufficiently different ? wireless channels fade
independently when separated a fractional of
wavelength - Unknown to Eve
16Indeterminacy of Blind Channel Estimation
17Indeterminacy of Blind Symbol Estimation
- Proposition
- Result
- Eves error rate high
- Bobs error rate low (identical to optimal MIMO
eigen-beamforming) - Cost paid higher transmission power
18Transmission secrecy
- Weights are selected randomly and unknown to Eve,
blind deconvolution is made impossible - Weights are selected by Alice, no need to tell
Bob ? equivalently one-time pad - Information theory guarantees high and positive
secret channel capacity ? provable (information
theoretic) secrecy
19Eves Exhaustive Search Attack
- Eve may exhaustively try all possible channels
(both ). - The complexity can be at least
, according to quantization level Q - Low quantization level reduces complexity, but
increases symbol estimation error ? still makes
high positive secret channel capacity possible - Example,
205. Simulations
J6. K4. QPSK.
- BER of the proposed transmission scheme
21- Secret channel capacity with the simulated BER
22Conclusions
- Proposed a randomized MIMO transmission scheme
- Use array redundancy and channel diversity for
transmission security - Enhance transmission LPI in the PHY-layer by
increasing the adversarys receiving error - Proof of secrecy with weight randomization and
limit of blind deconvolution