Massive MIMO Physical Layer Cryptosystem through Inverse Precoding - - PowerPoint PPT Presentation

massive mimo physical layer cryptosystem through inverse
SMART_READER_LITE
LIVE PREVIEW

Massive MIMO Physical Layer Cryptosystem through Inverse Precoding - - PowerPoint PPT Presentation

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions Massive MIMO Physical Layer Cryptosystem through Inverse Precoding Amin Sakzad Clayton School of IT Monash University


slide-1
SLIDE 1

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Massive MIMO Physical Layer Cryptosystem through Inverse Precoding

Amin Sakzad Clayton School of IT Monash University amin.sakzad@monash.edu Joint work with Ron Steinfeld October 2015

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-2
SLIDE 2

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

1

Background and Problem Statement

2

Zero-Forcing (ZF) attack and its Advantage Ratio

3

Inverse Precoding

4

Conclusions

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-3
SLIDE 3

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

MIMO Wiretap Channel 1

We consider a slow-fading MIMO wiretap channel model as follows:

Figure: The block diagram of a MIMO wiretap channel.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-4
SLIDE 4

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

MIMO Wiretap Channel 2

The nr × nt real-valued MIMO channel from user A to user B is denoted by H.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-5
SLIDE 5

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

MIMO Wiretap Channel 2

The nr × nt real-valued MIMO channel from user A to user B is denoted by H. We also denote the channel from A to the adversary E by an n′

r × nt matrix G.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-6
SLIDE 6

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

MIMO Wiretap Channel 2

The nr × nt real-valued MIMO channel from user A to user B is denoted by H. We also denote the channel from A to the adversary E by an n′

r × nt matrix G.

The entries of H and G are identically and independently distributed (i.i.d.) based on a Gaussian distribution N1. This model can be written as: y = Hx + e, y′ = Gx + e′.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-7
SLIDE 7

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Dean-Goldsmith Model 1

The entries xi of x ∈ Rnt, for 1 ≤ i ≤ nt, are drawn from a constellation X = {0, 1, . . . , m − 1} for an integer m.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-8
SLIDE 8

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Dean-Goldsmith Model 1

The entries xi of x ∈ Rnt, for 1 ≤ i ≤ nt, are drawn from a constellation X = {0, 1, . . . , m − 1} for an integer m. The components of the noise vectors e and e′ are i.i.d. based

  • n Gaussian distributions Nm2α2 and Nm2β2, respectively. We

assume α = β.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-9
SLIDE 9

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Dean-Goldsmith Model 1

The entries xi of x ∈ Rnt, for 1 ≤ i ≤ nt, are drawn from a constellation X = {0, 1, . . . , m − 1} for an integer m. The components of the noise vectors e and e′ are i.i.d. based

  • n Gaussian distributions Nm2α2 and Nm2β2, respectively. We

assume α = β. The channel state information (CSI) is available at all the transmitter and receivers.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-10
SLIDE 10

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Dean-Goldsmith Model 2

To send a message x to B, user A performs a singular value decomposition (SVD) precoding.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-11
SLIDE 11

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Dean-Goldsmith Model 2

To send a message x to B, user A performs a singular value decomposition (SVD) precoding. Let SVD of H be given as H = UΣVt. The user A transmits Vx instead of x and B applies a filter matrix Ut to the received vector y.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-12
SLIDE 12

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Dean-Goldsmith Model 2

To send a message x to B, user A performs a singular value decomposition (SVD) precoding. Let SVD of H be given as H = UΣVt. The user A transmits Vx instead of x and B applies a filter matrix Ut to the received vector y. With this, the received vectors at B and E are as follows: ˜ y = Σx + ˜ e, y′ = GVx + e′, where ˜ e = Ute.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-13
SLIDE 13

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Correctness Condition for Dean-Goldsmith Cryptosystem

Since Σ = diag(σ1(H), . . . , σnt(H)) is diagonal, user B recovers an estimate ˜ xi of xi as follows: ˜ xi = ⌈˜ yi/σi(H)⌋ = xi + ⌈˜ ei/σi(H)⌋ .

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-14
SLIDE 14

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Correctness Condition for Dean-Goldsmith Cryptosystem

Since Σ = diag(σ1(H), . . . , σnt(H)) is diagonal, user B recovers an estimate ˜ xi of xi as follows: ˜ xi = ⌈˜ yi/σi(H)⌋ = xi + ⌈˜ ei/σi(H)⌋ . The decoding process succeeds if |˜ ei| < |σi(H)|/2 for all 1 ≤ i ≤ nt.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-15
SLIDE 15

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Correctness Condition for Dean-Goldsmith Cryptosystem

Since Σ = diag(σ1(H), . . . , σnt(H)) is diagonal, user B recovers an estimate ˜ xi of xi as follows: ˜ xi = ⌈˜ yi/σi(H)⌋ = xi + ⌈˜ ei/σi(H)⌋ . The decoding process succeeds if |˜ ei| < |σi(H)|/2 for all 1 ≤ i ≤ nt. Let P [B|H] be the probability that B incorrectly decodes x: P [B|H] ≤ ntPw←

֓Nm2α2 [|w| < |σnt(H)|/2]

= ntPw←

֓N1 [|w| < |σnt(H)|/(2mα)]

≤ nt exp

  • (−|σnt(H)|2)/(8m2α2)
  • ,

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-16
SLIDE 16

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Correctness Condition for Dean-Goldsmith Cryptosystem

Since Σ = diag(σ1(H), . . . , σnt(H)) is diagonal, user B recovers an estimate ˜ xi of xi as follows: ˜ xi = ⌈˜ yi/σi(H)⌋ = xi + ⌈˜ ei/σi(H)⌋ . The decoding process succeeds if |˜ ei| < |σi(H)|/2 for all 1 ≤ i ≤ nt. Let P [B|H] be the probability that B incorrectly decodes x: P [B|H] ≤ ntPw←

֓Nm2α2 [|w| < |σnt(H)|/2]

= ntPw←

֓N1 [|w| < |σnt(H)|/(2mα)]

≤ nt exp

  • (−|σnt(H)|2)/(8m2α2)
  • ,

By choosing parameters like m2α2≤|σnt(H)|2/8 log(nt/ε),

  • ne can ensure that B is less than any ε > 0.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-17
SLIDE 17

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Security Condition for Dean-Goldsmith Cryptosystem 1

MIMO − Search problem: Recovering x from y′ = Gvx + e′

and Gv, with non-negligible probability, under certain parameter settings, upon using massive MIMO systems with large number of transmit antennas nt.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-18
SLIDE 18

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Security Condition for Dean-Goldsmith Cryptosystem 1

MIMO − Search problem: Recovering x from y′ = Gvx + e′

and Gv, with non-negligible probability, under certain parameter settings, upon using massive MIMO systems with large number of transmit antennas nt. We say that the MIMO − Search problem is hard (secure) if any attack algorithm against MIMO − Search with run-time poly(nt) has negligible success probability n−ω(1)

t

.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-19
SLIDE 19

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Security Condition for Dean-Goldsmith Cryptosystem 2

A polynomial-time complexity reduction is claimed from worst-case instances of the GapSVPnt/α in lattices of dimension nt, to the MIMO − Search problem with nt transmit antennas, noise parameter α and constellation size m, assuming the following minimum noise level holds: mα > √nt. (1)

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-20
SLIDE 20

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Security Condition for Dean-Goldsmith Cryptosystem 2

A polynomial-time complexity reduction is claimed from worst-case instances of the GapSVPnt/α in lattices of dimension nt, to the MIMO − Search problem with nt transmit antennas, noise parameter α and constellation size m, assuming the following minimum noise level holds: mα > √nt. (1) The above cryptosystem is called the Massive MIMO Physical Layer Cryptosystem (MM − PLC).

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-21
SLIDE 21

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Our Contributions

We show that the eavesdropper can decrypt the information data under the same condition as the legitimate receiver.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-22
SLIDE 22

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Our Contributions

We show that the eavesdropper can decrypt the information data under the same condition as the legitimate receiver. We study the signal-to-noise advantage ratio for a more generalized scheme with an arbitrary precoder and show that if n′

r ≫ nt, then there is no such an advantage.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-23
SLIDE 23

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Our Contributions

We show that the eavesdropper can decrypt the information data under the same condition as the legitimate receiver. We study the signal-to-noise advantage ratio for a more generalized scheme with an arbitrary precoder and show that if n′

r ≫ nt, then there is no such an advantage.

On the positive side, for the case n′

r = nt, we give an O

  • n2

upper bound on the advantage and show that this bound can be approached using an inverse precoder.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-24
SLIDE 24

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Our Contributions

We show that the eavesdropper can decrypt the information data under the same condition as the legitimate receiver. We study the signal-to-noise advantage ratio for a more generalized scheme with an arbitrary precoder and show that if n′

r ≫ nt, then there is no such an advantage.

On the positive side, for the case n′

r = nt, we give an O

  • n2

upper bound on the advantage and show that this bound can be approached using an inverse precoder. We give a lower bound on the decoding advantage ratio of the legitimate user over an eavesdropper who is equipped with a non-linear successive interference cancelation (SIC) stronger than linear receivers.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-25
SLIDE 25

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Zero-Forcing (ZF) attack

The eavesdropper E receives y′ = Gvx + e′. Replacing the SVD, we get y′ = U′Σ′(V′)tx + e′, where Σ′ = diag (σ1(Gv), . . . , σnt(Gv)) = diag (σ1(G), . . . , σnt(G)) .

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-26
SLIDE 26

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Zero-Forcing (ZF) attack

The eavesdropper E receives y′ = Gvx + e′. Replacing the SVD, we get y′ = U′Σ′(V′)tx + e′, where Σ′ = diag (σ1(Gv), . . . , σnt(Gv)) = diag (σ1(G), . . . , σnt(G)) . S(he) computes ˜ y′ = (Gv)−1y′ = x + ˜ e′, (2) where ˜ e′ = V′(Σ′)−1(U′)te′. User E is now able to recover an estimate ˜ x′

i of xi by rounding:

˜ x′

i = ⌈˜

y′

i⌋ = ⌈xi + ˜

e′

i⌋ = xi + ⌈˜

e′

i⌋.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-27
SLIDE 27

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Analysis of ZF attack

Lemma The components of ˜ e′ in (2) are distributed as Nσ2

E with

σ2

E ≤ m2α2

σ2

nt(G).

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-28
SLIDE 28

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

The union bound

The above explained ZF attack succeeds if |˜ e′

i| < 1/2 for all

1 ≤ i ≤ nt.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-29
SLIDE 29

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

The union bound

The above explained ZF attack succeeds if |˜ e′

i| < 1/2 for all

1 ≤ i ≤ nt. Let PZF [E|G] denotes the decoding error probability that E incorrectly recovers x using ZF attack. Based on Lemma 1, we have PZF [E|G] ≤ ntPw←

֓Nσ2

E

  • |w| < 1

2

ntPw←

֓N1

  • |w| < |σnt(G)|

2mα

  • .

(3)

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-30
SLIDE 30

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Distribution of the singular values

Theorem (Edelman89) Let M be an s × t matrix with i.i.d. entries distributed as N1. If s and t tend to infinity in such a way that s/t tends to a limit y ∈ [1, ∞], then σ2

t (M)

s →

  • 1 − 1

√y 2 (4) and σ2

1(M)

s →

  • 1 + 1

√y 2 , (5) almost surely.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-31
SLIDE 31

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Asymptotic probability of error

Theorem Fix any real ε, ε′ > 0, and y′ ∈ [1, ∞], and suppose that n′

r/nt → y′ as nt → ∞. Then, for all sufficiently large nt, the

probability PZF[E] that E incorrectly decodes the message x using a ZF decoder is upper bounded by ε, if m2α2 ≤ n′

r

  • 1 −

1 √y′

2 − ε′

  • 8 log

2nt

ε

  • .

(6)

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-32
SLIDE 32

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Advantage ratio

To analytically investigate the advantage of decoding at B over E, we define the following advantage ratio. Definition For fixed channel matrices H and G, the ratio advZF σ2

nt(H)

σ2

nt(G),

(7) is called the advantage of B over E under ZF attack.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-33
SLIDE 33

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Advantage ratio of SVD precoder with ZF attack

Theorem Let Hnr×nt be the channel between A and B and Gn′

r×nt be the

channel between A and E, both with i.i.d. elements each with distribution N1. Fix real y, y′ ∈ [1, ∞], and suppose that nr/nt → y and n′

r/nt → y′ as nt → ∞. Then, using a SVD

precoding technique in MM − PLC, we have advZF → √y − 1 2 √y′ − 1 2 almost surely as nt → ∞.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-34
SLIDE 34

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

General Precoder

One may wonder whether a different precoding method (again, assumed known to E) than used above may provide a better advantage ratio for B over E.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-35
SLIDE 35

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

General Precoder

One may wonder whether a different precoding method (again, assumed known to E) than used above may provide a better advantage ratio for B over E. Suppose that instead of sending ˜ x = Vx, user A precodes ˜ x = P(H)x, where P = P(H) is some other precoding matrix that depends on the channel matrix H.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-36
SLIDE 36

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

General Precoder

One may wonder whether a different precoding method (again, assumed known to E) than used above may provide a better advantage ratio for B over E. Suppose that instead of sending ˜ x = Vx, user A precodes ˜ x = P(H)x, where P = P(H) is some other precoding matrix that depends on the channel matrix H. Therefore, in this general case, the advantage ratio of maximum noise power decodable by B to that decodable by E under a ZF attack at a given error probability generalizes from (7) to advZF σ2

nt(HP)

σ2

nt(GP).

(8)

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-37
SLIDE 37

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Advantage ratio of general precoder with ZF attack

Theorem Let H and G be as in Theorem 5. Then we have advZF ≤ advupZF. Furthermore, fix real y, y′ ∈ [1, ∞], and suppose that nr/nt → y and n′

r/nt → y′ as nt → ∞, so that

n′

r/nr → y′/y ρ′. Then, using a general precoding matrix P(H)

in MM − PLC, we have advupZF → √y + 1 2 √y′ − 1 2 almost surely as nt → ∞. Hence, in the case n′

r = nr and

y′ = y → ∞, we have advupZF → 1. Moreover, if advupZF → c for some c ≥ 1, then min(y′, ρ′) ≤ 9.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-38
SLIDE 38

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Achievable Upper Bound on Advantage Ratio

Theorem (Edelman89) Let M be a t × t matrix with i.i.d. entries distributed as N1. The least singular value of M satisfies lim

t→∞ P

√ tσt(M) ≥ x

  • = exp

−x2 2 − x

  • .

(9)

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-39
SLIDE 39

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

The upper bound

Theorem Let ε > 0 be fixed, H and G be n × n matrices as in Proposition 5 with n = nt = nr = n′

  • r. Using a general precoder

P(H) to send the plain text x, the maximum possible advZF that B can achieve over E, is of order O

  • n2

, except with probability ≤ ε.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-40
SLIDE 40

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Inverse Precoder Model

We have ˜ y = Inx + ˜ e, y′ = GH−1x + e′,

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-41
SLIDE 41

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Inverse Precoder Model

We have ˜ y = Inx + ˜ e, y′ = GH−1x + e′, Note that, for the inverse precoder the advantage ratio (7) under ZF decoding algorithm at user E can be written as 1/σ2

n

  • GH−1

.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-42
SLIDE 42

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Inverse Precoder Model

We have ˜ y = Inx + ˜ e, y′ = GH−1x + e′, Note that, for the inverse precoder the advantage ratio (7) under ZF decoding algorithm at user E can be written as 1/σ2

n

  • GH−1

.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-43
SLIDE 43

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Distribution of quotient

Theorem Let Q = GH−1, where H and G are two n × n real Gaussian

  • matrices. The distribution of Q is proportional to

1 det (In + QQt)n . (10)

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-44
SLIDE 44

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Inverse Precoder achives maximum advZF

Theorem Let ε > 0 be fixed, H and G be n × n Gaussian matrices as in Proposition 5 with n = nt = nr = n′

  • r. Using an inverse precoder

P(H) = H−1 to send the plain text x, the decoding advantage with respect to zero-forcing attack advZF, is at least

1 4 log(1/ε) ·

  • n2 + n
  • = Ω
  • n2

, except with probability ≤ ε, for sufficiently large n.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-45
SLIDE 45

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

The exact probability for different orders of n

20 40 60 80 100 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 G(n) = n G(n) = n2 G(n) = 5 ∗ n2 G(n) = 10 ∗ n2 G(n) = n3

Figure: The amount of P [advZF < G(n)] for different G(n).

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-46
SLIDE 46

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

advZF for 1000 channel.

100 200 300 400 500 600 700 800 900 1000 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8 Samples log

10(adv)

log10(adv) mean(log

10(advup

)) mean(log

10(adv))

log10

  • n2

Figure: The advantage ratio (7) for 1000 square channels of size n = 200 using inverse precoder.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-47
SLIDE 47

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

P

  • n2σ2

n > x

  • for various n

1 2 3 4 5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 x Pr

  • n2σ2

n > x

  • n = 10

n = 50 n = 100

Figure: The numerical values of P

  • n2σ2

n > x

  • for different dimensions

n = 10, 50, and 100 for 10000 square channels of size n = 100 using inverse precoder.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-48
SLIDE 48

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Successive Interference Cancellation (SIC) 1

A lattice reduction algorithm is conducted first, and then a nearest plane algorithm is applied.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-49
SLIDE 49

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Successive Interference Cancellation (SIC) 1

A lattice reduction algorithm is conducted first, and then a nearest plane algorithm is applied. Let GH−1 = Q = OR be the QR decomposition of the equivalent channel. Then the received vector by user E equals y′ = ORx + e′.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-50
SLIDE 50

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Successive Interference Cancellation (SIC) 1

A lattice reduction algorithm is conducted first, and then a nearest plane algorithm is applied. Let GH−1 = Q = OR be the QR decomposition of the equivalent channel. Then the received vector by user E equals y′ = ORx + e′. Upon receiving y′, this user multiplies it by Ot. Hence, we get ˜ y = Inx + ˜ e, y′′ = Rx + Ote′ = Rx + e′′,

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-51
SLIDE 51

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Successive Interference Cancellation (SIC) 2

In SIC decoding framework, the last symbol is decoded first, i.e. ˜ x′

n =

y′′

n

rnn

  • = xn +

e′′

n

rnn

  • is an estimate for xn.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-52
SLIDE 52

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Successive Interference Cancellation (SIC) 2

In SIC decoding framework, the last symbol is decoded first, i.e. ˜ x′

n =

y′′

n

rnn

  • = xn +

e′′

n

rnn

  • is an estimate for xn.

The other symbols are approximated iteratively using ˜ x′

j =

  • y′′

j − n k=j+1 rjk˜

x′

k

rjj

  • ,

for j from n − 1 downward to 1.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-53
SLIDE 53

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Successive Interference Cancellation (SIC) 2

In SIC decoding framework, the last symbol is decoded first, i.e. ˜ x′

n =

y′′

n

rnn

  • = xn +

e′′

n

rnn

  • is an estimate for xn.

The other symbols are approximated iteratively using ˜ x′

j =

  • y′′

j − n k=j+1 rjk˜

x′

k

rjj

  • ,

for j from n − 1 downward to 1. The above mentioned SIC finds the closest vector if the distance from input vector to the lattice is less than half the length of the shortest r2

jj, that is r2

nn

2 .

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-54
SLIDE 54

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Advantage ratio under SIC

We define the following advantage ratio: advSIC r2

nn(I)

r2

nn(Q),

(11) is called the advantage of B over E under SIC attack. Since r2

nn(I) = 1, the advSIC = 1/r2 nn(Q).

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-55
SLIDE 55

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Distribution of diagonal elements 1

Theorem Let the matrices Q, O, and R be as above. Then r2

jj are

independently distributed as BII

n−j+1 2

, j

2

  • , for 1 ≤ j ≤ n.

A random variable v is said to have a beta distribution of the second type (beta prime distribution) BII(a, b) if it has the following probability density function 1 β(a, b)va−1(1 + v)−(a+b), v > 0, where both a and b are non-negative and β(a, b) is the beta function.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-56
SLIDE 56

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Distribution of diagonal elements 2

50 100 150 200 0.02 0.04 0.06 0.08 0.1 0.12 50 100 150 200 200 400 600 800 1000 1200 1400 1600 1800

Figure: The numerical histogram and the theoretical p.d.f. of r2

jj for

j = 10 and 10000 square channels of size n = 100 using inverse precoder.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-57
SLIDE 57

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Distribution of diagonal elements 3

1 2 3 0.5 1 1.5 1 2 3 50 100 150 200 250 300 350 400

Figure: The numerical histogram and the theoretical p.d.f. of r2

jj for

j = 50 and 10000 square channels of size n = 100 using inverse precoder.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-58
SLIDE 58

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Adversary with SIC

Theorem Let Hn×n be the channel between A and B and Gn×n be the channel between A and E, both with i.i.d. elements each with distribution N1. Then, using an inverse precoding technique in MM − PLC, we have advSIC = O (n).

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-59
SLIDE 59

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Numerical analysis of P

  • nr2

nn(Q) < x

  • 1

2 3 4 5 6 7 8 9 10 0.65 0.7 0.75 0.8 0.85 0.9 0.95 1 x Pr

  • nr2

nn < x

  • n = 10

n = 50 n = 100

Figure: The numerical values of P

  • nr2

nn(Q) < x

  • for different

dimensions n = 10, 50, and 100 for 10000 square channels of size n = 100 using inverse precoder.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-60
SLIDE 60

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Conclusions

A Zero-Forcing (ZF) attack has been presented for the massive multiple-input multiple-output MIMO physical layer cryptosystem (MM − PLC). A decoding advantage ratio has been defined and studied for ZF linear receiver. It has been shown that this advantage tends to 1 employing a singular value decomposition (SVD) precoding approach at the legitimate transmitter and a ZF linear receiver at the adversary. An advantage ratio in the order of n2 is achievable if the legitimate user applies an inverse precoder. If eavesdropper employs a stronger decoder algorithm such as a successive interference cancellation (SIC), then the advantage ratio will be reduced to a constant fraction of n.

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco

slide-61
SLIDE 61

Background and Problem Statement Zero-Forcing (ZF) attack and its Advantage Ratio Inverse Precoding Conclusions

Thank you!

Amin Sakzad Massive MIMO Physical Layer Cryptosystem through Inverse Preco