fingerprints in the ether: physical layer authentication

17
Fingerprints in the Ether: Physical Layer Authentication Liang Xiao Advisors: Prof. L. Greenstein, Prof. N. Mandayam and Prof. W. Trappe IAB 2007 WIRELESS INFORMATIONNETWORK LABORATORY

Upload: others

Post on 02-Oct-2021

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fingerprints in the Ether: Physical Layer Authentication

Fingerprints in the Ether: Physical Layer Authentication

Liang XiaoAdvisors: Prof. L. Greenstein, Prof. N. Mandayam and Prof. W. Trappe

IAB 2007

WIRELESS INFORMATION NETWORK LABORATORY

Page 2: Fingerprints in the Ether: Physical Layer Authentication

25/21/2007

Outline

Motivation & Main IdeaSystem Model & Hypothesis TestSimulation & Results

Time-Invariant Channel with Receiver Thermal NoiseTime-Variant Channel with Background Changes

Conclusion & Future Work

WIRELESS INFORMATION NETWORK LABORATORY

Page 3: Fingerprints in the Ether: Physical Layer Authentication

35/21/2007

Wireless networks more “exposed”to security problems:•Spoofing attacks•Passive eavesdropping•DoS attacks•And more…

Motivation

Page 4: Fingerprints in the Ether: Physical Layer Authentication

45/21/2007

Security ProtocolsQ1: Can we use the physical layer information to enhance security?A1: Yes, as we will seeQ2: What is the value added?A2: My graduation depends on finding out …

Page 5: Fingerprints in the Ether: Physical Layer Authentication

55/21/2007

“Fingerprints”: Distinguishes channel responses of different paths to enhance authentication

Other examples that benefit from multipath fading:CDMA: Rake processing that transforms multipath into a diversity-enhancing benefitMIMO: Transforms scatter-induced Rayleigh fading into a capacity-enhancing benefit

Main Idea: Fingerprints in the Ether

Page 6: Fingerprints in the Ether: Physical Layer Authentication

65/21/2007

Fingerprints in the Ether (Cont.)The channel frequency response in the indoor environments

Frequency selective with spatial variabilityRapidly decorrelates with distance: hard to predict and to spoof

Top View of Alcatel-Lucent’s Crawford Hill Laboratory, Holmdel, NJ

Page 7: Fingerprints in the Ether: Physical Layer Authentication

75/21/2007

PHY-Authentication Scenario

Alice

Bob

Bob estimates channel response HAB from Alice at time 0

TIME: 0

Probe Signal u(.)

HAB

• Narrow Pulset

u(t)

• Pilot Tones

Page 8: Fingerprints in the Ether: Physical Layer Authentication

85/21/2007

PHY-Authentication Scenario (Cont.)

Alice

BobBob estimates Ht at time t, and compares with HAB

TIME: t

Probe Signal

Ht = HAB

Case 1: Alice is still transmitting.

Eve

Desired result: Bob accepts the transmission.

Page 9: Fingerprints in the Ether: Physical Layer Authentication

95/21/2007

PHY-Authentication Scenario (Cont.)

Alice

BobBob estimates Ht at time t, and compares with HAB

TIME: t

Probe SignalHt = HEB

Case 2: Eve is transmitting, pretending to be Alice.

Eve

Desired result: Bob rejects the transmission.

Page 10: Fingerprints in the Ether: Physical Layer Authentication

105/21/2007

Sample frequency response at M frequenciesTwo complex frequency response vectors

Simple Hypothesis: H0:H1:

Test Statistic:Phase measurement error due to changes of receiver local oscillator

Channel measurement assumed to be noisy

22

1min || ||jA tZ H H e θ

θ σ= −

PHY-Authentication Via Hypothesis Test

t AB

t AB

H HH H

=≠

1 2

? 1 ? 2 ?

[ (0, ), (0, ),..., (0, )]

[ ( , ), ( , ),..., ( , )]

TAB AB AB AB M

Tt M

H H f H f H f

H H t f H t f H t f

=

=

Page 11: Fingerprints in the Ether: Physical Layer Authentication

115/21/2007

Rejection region of H0 :Detection Metrics

False Alarm Rate, Miss Rate,

Threshold is chosen to satisfy

Hypothesis Test (Cont.)

0( )HP Zα = > Γ

1( )HP Zβ = ≤ Γ

Z > Γ

0( )HP Z α> Γ =

Γ

Page 12: Fingerprints in the Ether: Physical Layer Authentication

125/21/2007

SimulationUse ray-tracing tool WiSE (Wireless System Engineering) to generate channel responses for specified real environmentsEve in the same room as Alice348*347/2=60,378 Alice-Eve pairs

Page 13: Fingerprints in the Ether: Physical Layer Authentication

135/21/2007

Case 1: Time-Invariant ChannelAverage miss rate , for required false alarm rate

1α =

Room # 1Sample Size (M)=5 Bandwidth (W) = 100 MHz

β 0.01α =

Page 14: Fingerprints in the Ether: Physical Layer Authentication

145/21/2007

Case 2: Time-Variant ChannelChannel response

Tap-delay model for the inverse Fourier transform of Single-sided exponential model as power delay profileAR-1 Model for the time correlation

W=10 MHz, M=10

More time variation

( , ) ( ) ( , )AB AB ABH t f H f t fε= +( , )AB t fε

Time variation is negligibleTime variation helpsTime variation is so big that it hurts Thermal noise is negligible

Page 15: Fingerprints in the Ether: Physical Layer Authentication

155/21/2007

Conclusion & Future WorkWe proposed a PHY-layer authentication scheme

Channel frequency response measurement and hypothesis testing are used to discriminate between a legitimate user and awould-be intruderVerified using a ray-tracing tool (WiSE) for indoor environmentWorks well, requiring reasonable values of the measurement bandwidth (e.g., W > 10 MHz), number of response samples (e.g., M ≤ 5) and transmit power (e.g., PT ~ 100 mW)Channel time-variations can improve the performance

Ongoing work:Cross-layer framework for security: protocol designTerminal mobilityMeasurements

Page 16: Fingerprints in the Ether: Physical Layer Authentication

165/21/2007

Thank you!

Questions?

Page 17: Fingerprints in the Ether: Physical Layer Authentication

175/21/2007

References[1] L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, “Fingerprints in

the either: using the physical layer for wireless authentication,” IEEE ICC’ 2007, to appear.

[2] L. Xiao, L. Greenstein, N. Mandayam, W. Trappe, “ Using the physical layer for wireless authentication in time-invariant channels,”submitted to IEEE Trans. On Wireless Communications, 2007.