winlab
play

WINLAB Rutgers, The State University of New Jersey - PowerPoint PPT Presentation

Jamming MIMO Communications Jamming MIMO Communications WINLAB Rutgers, The State University of New Jersey www.winlab.rutgers.edu Contact: Rob Miller rdmiller@winlab.rutgers.edu So just what is this guy talking about? So just what is this


  1. Jamming MIMO Communications Jamming MIMO Communications WINLAB Rutgers, The State University of New Jersey www.winlab.rutgers.edu Contact: Rob Miller rdmiller@winlab.rutgers.edu

  2. So just what is this guy talking about? So just what is this guy talking about? � Multi-Input Multi-Output (MIMO) Overview � Channel State Information (CSI) � MIMO Channel Capacity � Jamming Results and Observations – Singular Value Decomposition (SVD)-based MIMO – Alamouti Space-Time Block Code (STBC) � Conclusions and Questions WINLAB [2]

  3. Introducing the MIMO channel… … Introducing the MIMO channel •Alice sends x using n t transmit antennas •Bob sees r with n r receive antennas r = H x + n where, H is n r by n t channel matrix n is additive channel noise Alice Bob WINLAB [3]

  4. Three main sub- -categories of MIMO exist categories of MIMO exist… … Three main sub � Spatial Multiplexing – Low-rate streams are created from a high-rate signal and transmitted from different antennas – Does not always require Channel State Information (CSI) – Can be combined with Pre-coding or Diversity Coding � Pre-coding – Ranges from multi-layer beamforming to all spatial processing – Requires CSI at the transmitter � Diversity Coding – Includes space-time coding (STC) techniques – Does not require CSI at the transmitter WINLAB [4]

  5. Most MIMO schemes involve some level of Most MIMO schemes involve some level of Channel State Information (CSI). Channel State Information (CSI). � Channel State Information is utilized by the transmitter, the receiver, or both. – Bob to Alice – Alice to Bob M – Alice to Bob and then back ◆ estim ation Alice Bob ◆ m essaging � 802.11n packet structure lets Bob estimate the CSI. WINLAB [5]

  6. Attacking only the CSI procedure is efficient, Attacking only the CSI procedure is efficient, effective, and covert. effective, and covert. CSI Training Sequences (TS) are shorter than data transmissions � Efficient Jamming only during the CSI is energy conservative � Effective Jamming the CSI causes errors in decoding the data � Covert Jamming only the CSI is more inconspicuous TS Data time Eve WINLAB [6]

  7. A commonly studied MIMO technique A commonly studied MIMO technique is SVD- -based MIMO. based MIMO. is SVD H = U ΣV H � Recall, the SVD of H yields U and V are the left and right singular vectors Singular values found in diag( ∑ ) � Bob and Alice compute the SVD r= H V x + n V x – Alice transmits ( Vx ) – Bob receives r , H and operates on it with ( U H ) U H r d = U H H V x + U H n = Alice Bob U H U ΣV H V x + U H n = Σx + U H n = Results in min(n r , n t ) parallel SISO channels WINLAB [7]

  8. SVD- -based MIMO can achieve capacity by based MIMO can achieve capacity by SVD waterfilling over the best channel over the best channel eigenmodes eigenmodes. . waterfilling � Mutual Information n r + ρH Q H H ] I ( H , Q )= l og 2 ( de t ( [ I ) ) � Maximization: Q ⋆ = V di n }V H ag{p ⋆ p ⋆ 1 , . . . , waterfilling � Capacity: n � 1+ ρp ⋆ C ( H )= l og 2 [ k λ k ] k= 1 � Power Distribution: μ 1 p ⋆ + k = ( μ − ) ρλ k � n k= 1 p ⋆ k = P , where Power Constraint WINLAB [8]

  9. Jamming SVD- -based MIMO is complicated based MIMO is complicated Jamming SVD as there are many degrees of freedom. as there are many degrees of freedom. The rabbit hole deepens… � CSI knowledge: – Perfect, Estimated, None � Perturbation Ability: – Perfect, Estimated, Random � Target: – Alice, Bob, Alice and Bob � Equipment: – Single/Multiple antenna – Power constraints (J/S) General CSI jamming WINLAB [9]

  10. With ample control, Eve may force Alice and With ample control, Eve may force Alice and Bob to perform opposite waterfilling waterfilling. . Bob to perform opposite � Eve can force opposite waterfilling – Compute the SVD of H H = U ΣV H – Reverse the singular values σ i = σ n− i ˆ – Reconstruct the new channel H = U ˆ ˆ ΣV H – Disseminate the new info ˆ H Alice and Bob use WINLAB [10]

  11. Without CSI or complete RF control, Eve can Without CSI or complete RF control, Eve can still effectively jam SVD- -based MIMO. based MIMO. still effectively jam SVD � Random perturbations of H make small singular values larger � If Alice and Bob use the same estimate σ 1 ˆ σ 1 – Emphasize a physical channel to create a random channel σ 2 ◆ Pow er, on average , w ill em pty uniform ly into the actual eigenm odes of the channel � If Alice and Bob use independent estimates – Emphasize different physical channels to create two random channels ◆ Alice pre-codes w ith right singular vectors that do not pair w ith the left singular vectors that Bob uses for decoding WINLAB [11]

  12. Another popular MIMO scheme is the Alamouti Alamouti Another popular MIMO scheme is the Space- -Time Block Code (STBC). Time Block Code (STBC). Space � The Alamouti STBC is included in 802.11n, WiMax, and 3GPP � Analyze the 2 by 1 STBC vulnerabilities – 2 transmit antennas – 1 receive antenna � Extend results to 2 by 2 STBC and beyond WINLAB [12]

  13. The Alamouti Alamouti 2 by 1 STBC is essentially a 2 by 1 STBC is essentially a The spatial repeater with a decoding trick. spatial repeater with a decoding trick. � Spatial repeater w/decoding trick – Alice has 2 transmit antennas – Bob has 1 receive antenna * -c 2 c 1 h 1 h 2 * c 1 c 2 Symbol Period 2, Bob receives: Symbol Period 1, Bob receives: ∗ ∗ c 1 c 2 r 1 = c 1 h 1 + c 2 h 2 + n 1 r 2 = − c 2 h 1 + c 1 h 2 + n 1 WINLAB [13]

  14. The Alamouti Alamouti 2 by 1 STBC is essentially a 2 by 1 STBC is essentially a The spatial repeater with a decoding trick. spatial repeater with a decoding trick. � Over both symbol periods, Bob receives: r = G c+ n � h 1 � h 2 G = h ∗ − h ∗ 2 1 � n 1 � � c � 1 n = c = n ∗ c 2 2 � r � 1 r = ∗ r 2 WINLAB [14]

  15. The Alamouti Alamouti 2 by 1 STBC is essentially a 2 by 1 STBC is essentially a The spatial repeater with a decoding trick. spatial repeater with a decoding trick. � Bob decodes by selecting the symbol-tuple that minimizes the decoding metric: G H r− αˆ 2 d = | c| G H ( 2 = | G c+ n)− αˆ c| G H G c+ G H n − αˆ 2 = | c| αc+ G H n − αˆ 2 = | c| c)+ G H n| 2 = | α( c− ˆ G H G = αI Note: 2 2 + | 2 α = | h 1 | h 2 | WINLAB [15]

  16. We investigate the impact of jamming the We investigate the impact of jamming the channel estimate for the Alamouti Alamouti 2 by 1 STBC. 2 by 1 STBC. channel estimate for the ˆ � Eve jams: G → G � Bob now selects the symbol-tuple that minimizes the jammed decoding metric: H r− ˆ |ˆ 2 αˆ d J = G c| Eve’s goal H ( |ˆ 2 = G G c+ n)− ˆ αˆ c| Maximize d J for H ( |ˆ G c+ n − ˆ 2 G ˆ = G c) | the proper H ( H n| symbol-tuple, |ˆ G c− ˆ c)+ ˆ 2 = G G ˆ G minimize it 2 + | otherwise Note: ˆ ˆ 2 α = | ˆ h 1 | h 2 | WINLAB [16]

  17. Forcing minimization for the Alamouti Alamouti 2 by 1 2 by 1 Forcing minimization for the STBC can be done in multiple ways. STBC can be done in multiple ways. � Metric minimization occurs decoding metric H ) when G c− ˆ c)∈ N (ˆ G ˆ ( G H r− ˆ |ˆ – 2 interesting cases: 2 αˆ d J = G c| H ( H = 0 |ˆ (1) 2 ˆ = G G c+ n)− ˆ αˆ c| G Not covert H ( |ˆ G c+ n − ˆ 2 (2) G c− ˆ = G G ˆ c) | G ˆ c = 0 H ( H n| |ˆ G c− ˆ c)+ ˆ 2 = G G ˆ G � Notable Attacks – Selective Symbol Jamming Force Bob to decode sym bol-tuples Eve desires! – Oscillating Channel Inversion Attack Guaranteed jam m ing perform ance w ith no CSI! WINLAB [17]

  18. With ample control, Eve can force Bob to With ample control, Eve can force Bob to decode the symbol- -tuples tuples that she desires. that she desires. decode the symbol � Selective Symbol Jamming – Eve chooses: ˆ c Σ − 1 c U H G = G cV ˆ ˆ c ˆ c V H ˆ c = U ˆ c Σ ˆ where ˆ c BPSK Example using h = [7 -8] Eve’s goal: Make Bob decode c(1) not c(0). But, jamming also affects the other transmitted symbol tuples. WINLAB [18]

  19. With ample control, Eve can force Bob to With ample control, Eve can force Bob to decode the symbol- -tuples tuples that she desires. that she desires. decode the symbol � � � Selective Symbol Jamming a b ˆ – But, the format of G may be constrained: G = ∗ − a ∗ b – Viable solutions still exist. BPSK Example using h = [7 -8] Eve’s goal: Make Bob decode c(1) not c(0). Now use: ˆ h = [ − 7− 8] WINLAB [19]

  20. Without CSI or complete RF control, Eve can Without CSI or complete RF control, Eve can still effectively jam the Alamouti Alamouti STBC. STBC. still effectively jam the � Optimal Jamming Region is constellation specific � Oscillating Channel Inversion Attack – For single antenna using QPSK, P( Ω ) = ¾ (when J/S >> 0 dB) – Oscillating by 180 guarantees jamming region penetration Single Antenna Jamming Region Dual Antenna Jamming Region FSM J/S >> 0 dB WINLAB [20]

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend