460 likes | 627 Views
Increasing the Security by Cooperation in Wireless Networks. My school and my personal data Motivation for the proposed research Marie Curie Project Current work Cooperative communications (game theory approach) Cooperation for security with jamming with relaying
E N D
My school and my personal data • Motivation for the proposed research • Marie Curie Project • Current work • Cooperative communications (game theory approach) • Cooperation for security • with jamming • with relaying • Disscusion and directions for future work
Kingdom of Norway Size: 385’252 km2 Population: 4.8 million Capital: Oslo Oslo
University of Oslo (UiO) • Norwegian University of Science and Technology (NTNU) in Trondheim • Norwegian Defense Research Establishment (FFI) • Institute for Energy Technology (Ife) • Telenor R&I
Applied information technology • Energy and environment
Network, information security, and • signal processing for communications • Prof. Are Hjørungnes (www.unik.no/~arehj) • Electronics and photonics • Cybernetics and Industrial Mathematics 7
Nationality – Macedonia (Makedonia, マケドニア) • Undergraduate studies – University of Skopje (93 – 98) • Graduate Studies – EPFL (Lausanne, CH) (98 – 04) • Nokia Research Center (Helsinki, FIN) (03) • Sowoon Technologies (Company, Lausanne, CH) (04-07) • University of Hawai’i at Manoa (Honolulu, HI) (07-08) • University of Oslo (08-09) • Princeton University (09-12) • EPFL (12-13?) 8
Improve the secrecy of transmitted data in a wireless network by cooperation among the terminals. Information theoretic security – the ability of the physical layer to provide security (beside the reliability) of the transmitted (broadcasted) data
Security – traditionally higher layer issue • Physical layer security – secrecy capacity [Wyner ‘75] • Design a decentralized system that will protect the broadcasted data and make it hard for anyeavesdropper to receive the packets intended to reach only the destination • All malicious nodes should be kept as ignorant of that information as possible • The channel is wireless – no perfect secrecy can be guaranteed
Two years at Princeton (with Prof. H. Vincent Poor) • Channel models for secure cooperative communications • Cooperative scenarios (Game Theory, Feedback) • Code design (LDPC, other codes) • One year at EPF Lausanne (with Prof. Bixio Rimoldi) • Completing the project, testing and simulating wireless ad-hoc and hybrid networks
4 3 1 2 1→3 2 → 4 t 1-
Y=01001011 0 0 1 1 0 0 1 1 I(W;Y)/n=H(W)/n-H(W|Y)/n = 1 – 0 = 1 Z=00101110 W=01001011 I(W;Z)/n=H(W)/n-H(W|Z)/n = 1 – 1 = 0 0.5 0.5 The eavesdropper must be degraded
Jamming improves the secrecy capacity • Interaction between the source and jammers • Distributed solution • Tradeoff for the jammers price • Multiple jammer case: the source should buy service from only onejammer
R R D S R M
Destination • Relay i • Power constraints • Source • Relay • Path loss coefficient model • Noise: Gaussian(0, σ2)
Correlation models • Model 1: • Model 2:
Upper bound [Gastpar & Vetterli 2005] • Lower bound [Gastpar & Vetterli 2005] • where
Malicious node • Secrecy capacity bounds
Definition 1: The geometrical area (region) in which the secrecy capacity is positive is called secrecy region. Definition 2: The geometrical area (region) in which the secrecy capacity vanishes is called vulnerability region. Definition 3: The normalized vulnerability region (NVR) is the ratio between the vulnerability region and the surface of the disk with radius dd,s.
source destination relay malicious node
source destination relay malicious node
source destination relay malicious node
Cooperation among the nodes improvesthe physical layer security by minimizing the vulnerability region • More relays, less increase in the improvement: The most dramatic improvement is obtained by cooperation with one relay in comparison to the non-cooperative case • The source should choose relays that stay closer to the S-D line • The source has more benefit from the relays than the eavesdropper
Cryptography • Physical layer secrecy to distribute the keys • Game Theory • Jamming • Cooperation • Different types of games • Mechanism design • Information theoretic security • Interference channels • Feedback • Partial channel state information • Relaying • Networking • Cross layer designs • Coding Theory • How to design practical codes • LDPC • Other types
Binary channels (BEC, BSC, ZC, BAC) • Discrete memoryless channels • Channels with memory • Gaussian channels • Fading channels • MIMO
ARIGATO ありがとうございます ninoslav.marina@gmail.com www.unik.no/~nino