1 of 10

Attack and Countermeasures on Physical-Layer Security in Wireless Network | Wk 4

Professor Huirong Fu

Mr. Rui Zhu

Charles Dana

Emmanuel Amiewalan

6/12/17

2 of 10

Presentation Outline

  • Key terms
  • Recap
  • Weekly update
  • Timeline
  • References
  • Questions

3 of 10

Key Terms

  • Spatial correlation: A correlation between a signal's spatial direction and the average received signal gain between two observed nodes.
  • Angle spread: The observed angle of an attacking node upon the link signature (LS) between a transmitter receiver (T,R) pair.
  • Link correlation: The correlation of attacking nodes LS (Eve) of with that of the LS between (T,R) (Bob & Alice).
  • Channel characteristics: Additional information of (T,R) pairs such as time, gain, distance, etc…

4 of 10

Recap

ML Algorithm

New Data with Angles &

Link Signature Correlation

OU Server Implementation

Increased ML Algorithm

Guess Accuracy

Previous REU Data and ML

Algorithms

  • SVM
  • Ensemble Method
  • MV Regression

Performance time

Accuracy

Precision

Desired Optimizations

5 of 10

Recap (cont.)

Matlab Code Layout

Create tables

gen_link_Diff/Same

ML Training Data

train_table

Comparison Graph

problistic_model

Guessed key

resub_response

Accuracy Percentage

key_attempt

Ground Truth

test_table

Value Comparison

Resulting Graphs

(T,R)

Characteristics

New Data: Angles

LS Correlation

Wk 4 & Wk 5

New idea

6 of 10

Recap (cont.) | Visual Data

T

R

(T,R) = (1,4) | Observing Node = Node 7

7 of 10

  • Day 1
    • Finish testing all the ML methods that we have and do some comparisons between them to see which method takes the least amount of guesses
  • Day 2
    • Lecture based on different aspect to approach in terms of new algorithm
  • Day 3
    • Focus on two ideas/approach
      • Modifying the kernel Function for better result
      • Finding correlation of wireless channel using distance and angle spread
  • Day 4
    • Get the distance of each channel and begin implementing their angle in correspond to the transmitter and receiver been pass in for a single or multi target
  • Day 5
    • Continuing implementation…

Weekly Update

8 of 10

Timeline

WEEK 1

WEEK 2

WEEK 3

WEEK 4

WEEK 5

WEEK 6

WEEK 7

WEEK 8

WEEK 9

WEEK 10

Project

Overview

OU Server Capabilities

Matlab Code Overview

New Data Program for ML

Analyze Data Results

Complete Poster & Paper

For Week 5:

  • Make program to analyze link signature correlation
  • Collect data from node angle program
  • Integrate Mr. Rui’s new mathematical findings

Propose New Algorithm

9 of 10

References

Fang, Song, Yao Liu, and Peng Ning. "Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link Signature." IEEE Transactions on Information Forensics and Security 11.7 (2016): 1515-527. Web.

Patwari, Neal, and Sneha K. Kasera. "Robust Location Distinction Using Temporal Link Signatures." Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking - MobiCom '07 (2007): n. pag. Web.

Kyritsi, P., D.c. Cox, R.a. Valenzuela, and P.w. Wolniansky. "Correlation Analysis Based on MIMO Channel Measurements in an Indoor Environment." IEEE Journal on Selected Areas in Communications 21.5 (2003): 713-20. Web.

Mukherjee, Amitav, S. Ali A. Fakoorian, Jing Huang, and A. Lee Swindlehurst. "Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey." IEEE Communications Surveys & Tutorials 16.3 (2014): 1550-573. Web.

Mathur, Suhas, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. "Radio-telepathy." Proceedings of the 14th ACM International Conference on Mobile Computing and Networking - MobiCom '08 (2008): n. pag. Web.

Trappe, Wade. "The Challenges Facing Physical Layer Security." IEEE Communications Magazine 53.6 (2015): 16-20. Web.

He, Xiaofan, Huaiyu Dai, Wenbo Shen, and Peng Ning. "Is Link Signature Dependable for Wireless Security?" 2013 Proceedings IEEE INFOCOM (2013): n. pag. Web.

10 of 10

Questions?