Secret Communication via Secret Communication via Multi- -antenna - - PowerPoint PPT Presentation

secret communication via secret communication via multi
SMART_READER_LITE
LIVE PREVIEW

Secret Communication via Secret Communication via Multi- -antenna - - PowerPoint PPT Presentation

Secret Communication via Secret Communication via Multi- -antenna Systems antenna Systems Multi Zang Li Wade Trappe Roy Yates WINLAB, Rutgers University 1 Outline Information theory background on information security Problem


slide-1
SLIDE 1

1

Secret Communication via Secret Communication via Multi Multi-

  • antenna Systems

antenna Systems

Zang Li Wade Trappe Roy Yates WINLAB, Rutgers University

slide-2
SLIDE 2

2

Outline

Information theory background on information security Problem formulation for multiple antenna system Solution for a multiple-input-single-output (MISO) system Numerical evaluation Conclusion

slide-3
SLIDE 3

3

Introduction

Information theoretic secret communication over wireless medium in presence of a passive eavesdropper

– Eavesdropper is no better than random guessing the secret message

The noisy nature of the wireless medium can be exploited to achieve information theoretic communication Multi-antenna system: the extra degrees of freedom facilitates secret communication

slide-4
SLIDE 4

4

Scenario

  • Wireless broadcast channel
  • Passive eavesdropper
  • Can Alice talk to Bob secretly? If yes, what is the secrecy

rate? Alice Bob Eve

slide-5
SLIDE 5

5

Information Secure Secret Communication

  • Reliable transmission requirement
  • Perfect secrecy requirement
  • Secrecy capacity: maximum reliable rate with perfect secrecy

– This rate might be very small, but we only need it to setup the key for subsequent communication

Alice Xn Message: S Ŝ Error Probability P(S ≠ Ŝ) ≤ ε Normalized Equivocation H(S|Zn)/H(S)>1- ε P(Y|X) P(Z|X) Bob receives Yn Eve overhears Zn

slide-6
SLIDE 6

6

Wiretap Channel

Wiretap channel (Wyner75)

Eve Eve has a degraded channel X → Y → Z X Y Z

) ; ( ) ; ( max

) ( sec

Z X I Y X I C

x P

− =

P(Y|X) P(Z|Y) Alice Bob

slide-7
SLIDE 7

7

Broadcast Channel

Broadcast channel (Csiszar & Korner 78)

Eve

) ; ( ) ; ( max

sec

Z V I Y V I C

YZ X V

− =

→ →

X V P(X|V) Alice Y Z P(Y|X) P(Z|X) Bob

) ; ( ) ; ( max

sec

Z X I Y X I C

YZ X

− =

V is designed to confuse Eve more than Bob!

slide-8
SLIDE 8

8

When does V = X?

  • More capable condition (Csiszar & Korner 78) :

– I(X; Y) – I(X; Z) ≥ 0 for all input x

  • Bob’s channel is more capable ⇒ V = X

– Wiretap channel satisfies the more capable condition – Gaussian broadcast channel (when Bob’s SNR > Eve’s SNR)

  • Leung-Yan-Cheong &Hellman 1978
  • Still a mystery in many other scenarios
slide-9
SLIDE 9

9

Recent Work on Wireless PHY Secrecy

  • Mitrpant, Vinck, Luo [ISIT 06] Wiretap with noncausal CSI
  • Barros & Rodrigues [ISIT 06] Outage in Rayleigh Fading
  • Liang & Poor [Allerton 06] Ergodic Secrecy Capacity in Flat Fading
  • Li, Yates, Trappe [Allerton 06] Parallel Channels
  • Gopala, Lai, H. El Gamal [ITA 07] Slow Fading
  • Khisti, Tchamkerten and Wornell [IT] Secure broadcasting
  • Relay channel, multiple access channel, interference channel…
  • Multi-antenna system: Hero 03, Negi et. al. 03, Xiaohua Li et. al. 03,

Parada & Blahut 05 …

slide-10
SLIDE 10

10

Alice Bob Eve X Y Z H G

2 1

W GX Z W HX Y + = + =

Multi-antenna system provides gains in both communication rate and error performance. Can multiple antennas facilitate secret communication?

Problem Formulation

What is the secrecy capacity for this system?

slide-11
SLIDE 11

11

Why is the Problem Hard?

Alice Bob Eve X =[X1 Xn]T

Y=HX+W1 Z=GX+W2

) ; ( ) ; ( max

sec

Z V I Y V I C

YZ X V

− =

→ →

Capacity Issues: Preprocessing V→X ? Optimal Input V ?

More capable condition is not satisfied! V P(X|V)

?

slide-12
SLIDE 12

12

Simplification: Achievable Secrecy Rate

Take V=X to obtain a secrecy rate lower bound

– Achievable Rate: R = maxX I(X;Y) - I(X;Z)

Assume H & G are known to all parties How to maximize the rate over the distribution of X?

– Gaussian input characterized by covariance matrix Q

Difference of concave functions

slide-13
SLIDE 13

13

Gaussian MISO: M TX antennas, 1 RX antenna/user

Alice X =[X1 ••• XM]T

Y = hTX+W1 Z = gTX+W2

h = [h1 ••• hM]T g = [g1 ••• gM]T Now the outputs are scalars! Coordinate rotation can simplify the expressions without changing the system properties

Bob Eve

slide-14
SLIDE 14

14

Coordinate Transform

h g e1 e2

X X’

Useless to put power in the space orthogonal to h & g

= ||h|| e1 = ||g|| (αe1+(1-α2)1/2e2) = X1 e1 + X2e2

|| || || || h g h gT ⋅ = α

Y = hTX+W1 Z = gTX+W2

slide-15
SLIDE 15

15

Jamming View of the MISO Problem

  • X1 is signal for Bob, with power P1
  • X2 is jamming signal to annoy Eve, with power P2
  • Similar to correlated jamming [Medard 97], [Shafiee+Ulukus 05]

– except X1 and X2 are designed and transmitted by TX, – P1+P2 ≤ P

  • Questions:

– How to signal? – How to allocate power between X1 and X2? Alice Bob Eve X’ = [x1 , x2]T 1 1

|| || W X h Y + =

2 2 2 1

1 || || || || W X g X g Z + − + = α α

slide-16
SLIDE 16

16

Gaussian MISO with Gaussian Input

  • X2 should be linear to X1 for cancellation at Eve
  • When P1 is small, we should zero force Eve

– Choose – Eve receives Z = W2 ⇒ pure noise – RZF = I(X; Y) = log (1+||h||2P1)

  • For zero-forcing to be possible, P1 · P* = (1- α2)P

1 1

|| || W X h Y + =

2 2 2 1

1 || || || || W X g X g Z + − + = α α

1 2 2

1 X X α α − − =

slide-17
SLIDE 17

17

Gaussian MISO with Gaussian Input

  • Largest rate obtained by zero-forcing:

– RZF

*= log (1+||h||2P*)

  • But this is not optimal!

– Very conservative, same rate regardless of Eve’s channel gain

  • For P1 > P*, choose X2 = -cαX1 and P2 = P-P1 to cancel X1 as

much as possible

– Rs(P1) = I(X; Y) – I(X; Z)

1 1

|| || W X h Y + =

2 2 2 1

1 || || || || W X g X g Z + − + = α α

( )

⎟ ⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎜ ⎝ ⎛ + − − − + = 1 ) )( 1 ( || || 1 || || log

2 1 2 1 2 2 1 2

P P P g P h α α

slide-18
SLIDE 18

18

Secrecy Rate RS(P1)

α = 0.7, P = 10, ||h|| = 1.

Largest ZF rate

  • btained at P1=P*

ZF

Rs(P1) = log (1+||h||2P1)

( )

⎟ ⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎜ ⎝ ⎛ + − − − + = 1 ) )( 1 ( || || 1 || || log ) (

2 1 2 1 2 2 1 2 1

P P P g P h P Rs α α

Cancellation is not enough and Eve has a better channel

( )

⎟ ⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎜ ⎝ ⎛ + − − − + =

≤ ≤

1 ) )( 1 ( || || 1 || || log max

2 1 2 1 2 2 1 2 *

1 *

P P P g P h R

P P P s

α α Rs

*

slide-19
SLIDE 19

19

Optimal Secrecy Rate Rs

*

P =10, ||h|| = 1

Converge to ZF rate RZF=log (1+||h||2P*) P* = (1-α2)P

Eavesdropper Link Gain ||g||

(bits per channel use)

slide-20
SLIDE 20

20

Conclusions

The extra dimensions provided by multi-antenna system can enhance the secrecy rate Derived the secrecy rate for MISO Gaussian broadcast channel

– Coordinate transform – Partial cancellation at Eve – This rate was shown to be the capacity recently (Khisti et al ISIT2007)

slide-21
SLIDE 21

21

Thanks! Any Questions?

slide-22
SLIDE 22

22

Coding Procedure

Stochastic encoding, joint typical decoding (Csiszar&Korner 78)

S = 1 w 2nR 1 2nR’ Vn To ensure correct decoding at Bob (Bob finds only one typical sequence in the whole table.) R + R’ < I(V;Y)

Xn = f(Vn)

To ensure full equivocation at Eve (Eve finds at least one typical sequence in every column.) R’ > I(V;Z) R < I(V;Y) - I(V;Z)