Achieving physical layer security in multi-antenna wiretap channels
Achieving secure transmission in wireless network is a significantly important research topic. Classic cryptography encrypts a confidential message to an unreadable cipher message. Thus only the authentic receiver with correct secrecy key is able to decrypt the message. However, with the growing com...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/67324 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-67324 |
---|---|
record_format |
dspace |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering Xiong, Qi Achieving physical layer security in multi-antenna wiretap channels |
description |
Achieving secure transmission in wireless network is a significantly important research topic. Classic cryptography encrypts a confidential message to an unreadable cipher message. Thus only the authentic receiver with correct secrecy key is able to decrypt the message. However, with the growing computational capability of adversaries, the requirement of secrecy key generation and distribution is getting stringent. Another method to achieve wireless security, which has attracted much attention in recent years, is through physical layer processing, named physical layer security. In a typical wiretap channel model consisting of a transmitter, a legal receiver and an adversary (illegal receiver), early works have proven that it is possible to achieve positive secrecy rate using multiple antenna techniques, such as beamforming, at the transmitter. In this thesis, we focus on two types of malicious behaviors of the adversary: passive eavesdropping and active attack.
For the passive eavesdropping, we first consider the multi-input-single-output (MISO) wiretap channel, in which the legitimate transmitter utilizes the artificial noise aided precoding strategy to maximize the achievable secrecy rate of the channel. Both scenarios of known and unknown channel state information (CSI) for the eavesdropper channels are considered. By deriving the closed-form expression of ergodic secrecy rate, we prove that there exists an optimal power ratio between the information signal and the artificial noise. We then extend our study to a four-node fading channel model in a wireless relay network, which includes two single-antenna users, one single-antenna eavesdropper and one relay node equipped with multiple antennas. By studying the decode-and-forward (DF) scheme, cooperative jamming (CJ) scheme and one proposed hybrid relay scheme, relay-and-jamming (RJ), we aims to find the optimal relay scheme with the condition that the transmitter and the relay node are under individual power constraints and the CSI of the illegitimate channel is only statistically known. Our analysis shows that the hybrid RJ scheme is optimal when the transmitter has a relatively small power budget and/or the transmitter is far away from the intended receiver.
Besides the passive eavesdropping, the adversary could also choose the active attack. The pilot spoofing attack is one active attack conducted by the adversary during the channel estimation phase of the legitimate transmission. In practical systems, the pilot signals are usually known \textit{a priori} and repeatedly used information. In this attack, an intelligent adversary spoofs the transmitter on the estimation of CSI by sending the identical pilot signal as the legitimate receiver. By doing so, the adversary could obtain a larger channel rate in the data transmission phase, and also drastically weaken the strength of the received signal at the legitimate receiver if the adversary utilizes large enough power. Due to the serious consequences caused by such an attack, we first propose an energy ratio detector (ERD) that explores the asymmetry of received signal power levels at the transmitter and the legitimate receiver when the attack occurs. Our analysis shows that the ERD could provide very high probability of detection with certain requirement on the false alarming probability. Furthermore, we design a two-way training based scheme to provide not only attack detection but also secure transmission. The two-way training based detector (TWTD) exploits the intrusive component created by the adversary, followed by a secure beamforming-assisted data transmission. In addition to the good detection performance, our scheme could estimate both legitimate and illegitimate channels, with which the beamforming could be designed for data transmission. |
author2 |
Li Kwok Hung |
author_facet |
Li Kwok Hung Xiong, Qi |
format |
Theses and Dissertations |
author |
Xiong, Qi |
author_sort |
Xiong, Qi |
title |
Achieving physical layer security in multi-antenna wiretap channels |
title_short |
Achieving physical layer security in multi-antenna wiretap channels |
title_full |
Achieving physical layer security in multi-antenna wiretap channels |
title_fullStr |
Achieving physical layer security in multi-antenna wiretap channels |
title_full_unstemmed |
Achieving physical layer security in multi-antenna wiretap channels |
title_sort |
achieving physical layer security in multi-antenna wiretap channels |
publishDate |
2016 |
url |
https://hdl.handle.net/10356/67324 |
_version_ |
1772828523452432384 |
spelling |
sg-ntu-dr.10356-673242023-07-04T16:29:31Z Achieving physical layer security in multi-antenna wiretap channels Xiong, Qi Li Kwok Hung School of Electrical and Electronic Engineering Centre for Information Security DRNTU::Engineering::Electrical and electronic engineering Achieving secure transmission in wireless network is a significantly important research topic. Classic cryptography encrypts a confidential message to an unreadable cipher message. Thus only the authentic receiver with correct secrecy key is able to decrypt the message. However, with the growing computational capability of adversaries, the requirement of secrecy key generation and distribution is getting stringent. Another method to achieve wireless security, which has attracted much attention in recent years, is through physical layer processing, named physical layer security. In a typical wiretap channel model consisting of a transmitter, a legal receiver and an adversary (illegal receiver), early works have proven that it is possible to achieve positive secrecy rate using multiple antenna techniques, such as beamforming, at the transmitter. In this thesis, we focus on two types of malicious behaviors of the adversary: passive eavesdropping and active attack. For the passive eavesdropping, we first consider the multi-input-single-output (MISO) wiretap channel, in which the legitimate transmitter utilizes the artificial noise aided precoding strategy to maximize the achievable secrecy rate of the channel. Both scenarios of known and unknown channel state information (CSI) for the eavesdropper channels are considered. By deriving the closed-form expression of ergodic secrecy rate, we prove that there exists an optimal power ratio between the information signal and the artificial noise. We then extend our study to a four-node fading channel model in a wireless relay network, which includes two single-antenna users, one single-antenna eavesdropper and one relay node equipped with multiple antennas. By studying the decode-and-forward (DF) scheme, cooperative jamming (CJ) scheme and one proposed hybrid relay scheme, relay-and-jamming (RJ), we aims to find the optimal relay scheme with the condition that the transmitter and the relay node are under individual power constraints and the CSI of the illegitimate channel is only statistically known. Our analysis shows that the hybrid RJ scheme is optimal when the transmitter has a relatively small power budget and/or the transmitter is far away from the intended receiver. Besides the passive eavesdropping, the adversary could also choose the active attack. The pilot spoofing attack is one active attack conducted by the adversary during the channel estimation phase of the legitimate transmission. In practical systems, the pilot signals are usually known \textit{a priori} and repeatedly used information. In this attack, an intelligent adversary spoofs the transmitter on the estimation of CSI by sending the identical pilot signal as the legitimate receiver. By doing so, the adversary could obtain a larger channel rate in the data transmission phase, and also drastically weaken the strength of the received signal at the legitimate receiver if the adversary utilizes large enough power. Due to the serious consequences caused by such an attack, we first propose an energy ratio detector (ERD) that explores the asymmetry of received signal power levels at the transmitter and the legitimate receiver when the attack occurs. Our analysis shows that the ERD could provide very high probability of detection with certain requirement on the false alarming probability. Furthermore, we design a two-way training based scheme to provide not only attack detection but also secure transmission. The two-way training based detector (TWTD) exploits the intrusive component created by the adversary, followed by a secure beamforming-assisted data transmission. In addition to the good detection performance, our scheme could estimate both legitimate and illegitimate channels, with which the beamforming could be designed for data transmission. DOCTOR OF PHILOSOPHY (EEE) 2016-05-15T09:16:58Z 2016-05-15T09:16:58Z 2016 Thesis Xiong, Q. (2016). Achieving physical layer security in multi-antenna wiretap channels. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/67324 10.32657/10356/67324 en 155 p. application/pdf |