Fingerprints in the Ether: Physical Layer Authentication Liang Xiao - - PowerPoint PPT Presentation

fingerprints in the ether physical layer authentication
SMART_READER_LITE
LIVE PREVIEW

Fingerprints in the Ether: Physical Layer Authentication Liang Xiao - - PowerPoint PPT Presentation

WIRELESS INFORMATION NETWORK LABORATORY Fingerprints in the Ether: Physical Layer Authentication Liang Xiao Advisors: Prof. L. Greenstein, Prof. N. Mandayam and Prof. W. Trappe IAB 2007 WIRELESS INFORMATION NETWORK LABORATORY Outline


slide-1
SLIDE 1

Fingerprints in the Ether: Physical Layer Authentication

Liang Xiao Advisors: Prof. L. Greenstein, Prof. N. Mandayam and

  • Prof. W. Trappe

IAB 2007

WIRELESS INFORMATION NETWORK LABORATORY

slide-2
SLIDE 2

2 5/21/2007

Outline

Motivation & Main Idea System Model & Hypothesis Test Simulation & Results

Time-Invariant Channel with Receiver Thermal Noise Time-Variant Channel with Background Changes

Conclusion & Future Work

WIRELESS INFORMATION NETWORK LABORATORY

slide-3
SLIDE 3

3 5/21/2007

Wireless networks more “exposed” to security problems:

  • Spoofing attacks
  • Passive eavesdropping
  • DoS attacks
  • And more…

Motivation

slide-4
SLIDE 4

4 5/21/2007

Security Protocols

Q1: Can we use the physical layer information to enhance security? A1: Yes, as we will see Q2: What is the value added? A2: My graduation depends on finding out …

slide-5
SLIDE 5

5 5/21/2007

“Fingerprints”: Distinguishes channel responses of different paths

to enhance authentication

Other examples that benefit from multipath fading:

CDMA: Rake processing that transforms multipath into a diversity-

enhancing benefit

MIMO: Transforms scatter-induced Rayleigh fading into a capacity-

enhancing benefit

Main Idea: Fingerprints in the Ether

slide-6
SLIDE 6

6 5/21/2007

Fingerprints in the Ether (Cont.)

The channel frequency response in the indoor environments

Frequency selective with spatial variability Rapidly decorrelates with distance: hard to predict and to

spoof

Top View of Alcatel-Lucent’s Crawford Hill Laboratory, Holmdel, NJ

slide-7
SLIDE 7

7 5/21/2007

PHY-Authentication Scenario

Alice Bob

Bob estimates channel response HAB from Alice at time 0

TIME: 0

Probe Signal u(.) HAB

  • Narrow Pulse

t u(t)

  • Pilot Tones
slide-8
SLIDE 8

8 5/21/2007

PHY-Authentication Scenario (Cont.)

Alice Bob

Bob estimates Ht at time t, and compares with HAB

TIME: t

Probe Signal Ht = HAB Case 1: Alice is still transmitting.

Eve

Desired result: Bob accepts the transmission.

slide-9
SLIDE 9

9 5/21/2007

PHY-Authentication Scenario (Cont.)

Alice Bob Bob estimates Ht at time t, and compares with HAB

TIME: t

Probe Signal Ht = HEB Case 2: Eve is transmitting, pretending to be Alice.

Eve Desired result: Bob rejects the transmission.

slide-10
SLIDE 10

10 5/21/2007

Sample frequency response at M frequencies Two complex frequency response vectors Simple Hypothesis:

H0: H1:

Test Statistic:

Phase measurement error due to changes of receiver local

  • scillator

Channel measurement assumed to be noisy

2 2

1 min || ||

j A t

Z H H e θ

θ

σ = −

  • PHY-Authentication Via Hypothesis Test

t AB t AB

H H H H = ≠

1 2 ? 1 ? 2 ?

[ (0, ), (0, ),..., (0, )] [ ( , ), ( , ),..., ( , )]

T AB AB AB AB M T t M

H H f H f H f H H t f H t f H t f = =

slide-11
SLIDE 11

11 5/21/2007

Rejection region of H0 : Detection Metrics

False Alarm Rate, Miss Rate,

Threshold is chosen to satisfy

Hypothesis Test (Cont.)

0(

)

H

P Z α = > Γ

1 (

)

H

P Z β = ≤ Γ

Z > Γ

0(

)

H

P Z α > Γ =

Γ

slide-12
SLIDE 12

12 5/21/2007

Simulation

Use ray-tracing tool WiSE (Wireless System Engineering)

to generate channel responses for specified real environments

Eve in the same room as Alice 348*347/2=60,378 Alice-Eve pairs

slide-13
SLIDE 13

13 5/21/2007

Case 1: Time-Invariant Channel

Average miss rate , for required false alarm rate

1 α =

Room # 1 Sample Size (M)=5 Bandwidth (W) = 100 MHz

β

0.01 α =

slide-14
SLIDE 14

14 5/21/2007

Case 2: Time-Variant Channel

Channel response

Tap-delay model for the inverse Fourier transform of Single-sided exponential model as power delay profile AR-1 Model for the time correlation

W=10 MHz, M=10

More time variation

( , ) ( ) ( , )

AB AB AB

H t f H f t f ε = +

( , )

AB t f

ε

Time variation is negligible Time variation helps Time variation is so big that it hurts Thermal noise is negligible

slide-15
SLIDE 15

15 5/21/2007

Conclusion & Future Work

We proposed a PHY-layer authentication scheme

Channel frequency response measurement and hypothesis

testing are used to discriminate between a legitimate user and a would-be intruder

Verified using a ray-tracing tool (WiSE) for indoor environment Works well, requiring reasonable values of the measurement

bandwidth (e.g., W > 10 MHz), number of response samples (e.g., M ≤ 5) and transmit power (e.g., PT ~ 100 mW)

Channel time-variations can improve the performance

Ongoing work:

Cross-layer framework for security: protocol design Terminal mobility Measurements

slide-16
SLIDE 16

16 5/21/2007

Thank you! Questions?

slide-17
SLIDE 17

17 5/21/2007

References

[1] L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, “Fingerprints in the either: using the physical layer for wireless authentication,” IEEE ICC’ 2007, to appear. [2] L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, “ Using the physical layer for wireless authentication in time-invariant channels,” submitted to IEEE Trans. On Wireless Communications, 2007.