On the Security of Millimeter Wave Vehicular...

14
© Robert W. Heath Jr. (2016) On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets Mohammed Eltayeb*, Junil Choi*, TareqAl-Naffouri # , and Robert W. Heath Jr.* * Wireless Networking and Communications Group, Department of Electrical and Computer Engineering, The University of Texas at Austin # Electrical Engineering Department, King Abdullah University of Science and Technology (KAUST) Authors * are funded by U.S. Department of Transportation through D-STOP Tier 1 University Transportation Center and Texas Department of Transportation CAR-STOP

Transcript of On the Security of Millimeter Wave Vehicular...

© Robert W. Heath Jr. (2016)

On the Security of Millimeter Wave Vehicular Communication Systems using

Random Antenna SubsetsMohammed Eltayeb*, Junil Choi*, TareqAl-Naffouri#, and Robert W. Heath Jr.*

* Wireless Networking and Communications Group, Department of Electrical and Computer Engineering, The University of Texas at Austin# Electrical Engineering Department, King Abdullah University of Science and Technology(KAUST)

Authors * are funded by U.S. Department of Transportation through D-STOP Tier 1 University Transportation Center and Texas Department of Transportation CAR-STOP

© Robert W. Heath Jr. (2016)

2

Security threats in V2XEavesdropping attack Information extraction

T=0: slow down

T=T+τ: slow down

T=T+τ: all clear

Message replayattack

Message falsificationattack

Important to secure communication linksM. Raya, P. Papadimitratos, and J. Hubaux, “Securing vehicular communications,” IEEE Wireless Commun., vol. 13, no. 5, pp.8-15, Oct. 2006.J. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security and Privacy Mag., vol. 2, no. 3, May 2004, pp. 49-55.

© Robert W. Heath Jr. (2016)

Challenges with existing encryption techniques

3M. Raya, P. Papadimitratos, and J. Hubaux, “Securing vehicular communications,” IEEE Wireless Commun., vol. 13, no. 5, pp.8-15, Oct. 2006.J. Hubaux, S. Capkun, and J. Luo, “The security and privacy of smart vehicles,” IEEE Security and Privacy Mag., vol. 2, no. 3, May 2004, pp. 49-55.

Challenges motivate keyless physical layer (PHY) encryption

Broadcast of public key not possible in mmWave

due to high path loss

Fail if keys are compromised

Require exchange of keys (resource intensive)

Key distribution & management becomes

challenging as the network scales

© Robert W. Heath Jr. (2016)

4

Physical layer (PHY) encryption: limitations

Tx uses multiple antennas to degrade

eavesdropper’s channel

Does not rely on upper-layer data encryption or

secret keys

PHY LAYER SECURITY

Traditional PHY encryption not suitable for mmWave

systems(hardware limitations)

MmWave PHY techniques based on switched arrays do not fully exploit the

array gain

LIMITATIONS

© Robert W. Heath Jr. (2016)

Design analog precoderto distort sidelobes

Proposed mmWave PHY encryption approach

5

Sidelobedistortion jams eavesdroppers

Exploit alltransmitter antennas

No need for antenna switches

Analog design respects mmWave

hardware constraints

© Robert W. Heath Jr. (2016)

6

Two-ray model has beenreported to provide good fit

in open road

System model

Tx Antenna

Phase shifter

gain due to reflected path

H.L.VanTrees,Optimumarrayprocessing(detection,estimation,andmodulationtheory,partIV),1sted.WileyInterscience,Mar.2002.M. Boban, et al., “Geometry-based vehicle-to-vehicle channel modeling for large-scale simulation,” IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4146-4164, Nov. 14.

Tx AoD

© Robert W. Heath Jr. (2016)

System model (cont’d)

7H.L.VanTrees,Optimumarrayprocessing(detection,estimation,andmodulationtheory,partIV),1sted.WileyInterscience,Mar.2002.M. Boban, et al., “Geometry-based vehicle-to-vehicle channel modeling for large-scale simulation,” IEEE Trans. Veh. Technol., vol. 63, no. 9, pp. 4146-4164, Nov. 14.

Received signal model

received signal

symbol indextransmit power

path lossRx antenna

gain Tx-Rx channelTx symbol

Tx precoder

noise

Transmitter is equipped with target receiver’s AoD only

Two-ray LOS narrow band channel with

perfect synchronization

All receivers have perfect channel

knowledge

© Robert W. Heath Jr. (2016)

Proposed PHY encryption

8

Coherent combiningDestructive combining(Randomized with every

symbol transmission)

Transmit antenna

Destructive combining at Tx distorts sidelobes and jams eavesdroppers

Resulting pattern

distorted pattern distorted pattern Remaining antennas co-phased to destructively

combine at Rx

M antennas co-phased to coherently combine

at Rx

© Robert W. Heath Jr. (2016)

Precoder design

9

The nth entry of the precoder f(k) is

Percoder design is based on Analog Beamforming with a single RF chain

transmit symbol index Rx AoD coherent combining subset

even entries of destructive combining subset

odd entries of destructive combining subset

© Robert W. Heath Jr. (2016)

Received signal

10

At target Rx

At eavesdropper ( )Rθ θ≠

Beam pattern converges to a random variable at non-Rx directions

( )Rθ θ=transmit

subset size

no. of Txantennas

Rx arraygain

constant

random variable

eavesdropper array gain

© Robert W. Heath Jr. (2016)

Simulation results

11

Setup• Frequency 60 GHz, BW = 50MHz, power

37dBm• Standard two-ray channel model• Tx equipped with32 antennas and one RF chain• Rx and eavesdropper equipped with 16 and 32

antennas• Tx subset size is M = 0.75xNT

• Matched-filter Rx beamforming is assumed• Rx distance is 30 m, eavesdropper distance is

10 m• Rx is located along an AoD = 100 deg.

N.Valliappan,etal.,“Antennasubsetmodulationforsecuremillimeter-wavewirelesscommunication,”IEEETrans.Commun.,vol.61,no.8,pp.3231-3245,Aug.2013.

Secrecy throughput

SNR at target receiver

SNR at eavesdropper

High secrecy throughput except at AoD = 100o

© Robert W. Heath Jr. (2016)

Varying the transmission subset size

12

There is an optimal subset size that maximizes the secrecy throughputN.Valliappan,etal.,“Antennasubsetmodulationforsecuremillimeter-wavewirelesscommunication,”IEEETrans.Commun.,vol.61,no.8,pp.3231-3245,Aug.2013.

Using all antennas increases the beam pattern variance at non-Rx directions when compared to switched array

techniques

© Robert W. Heath Jr. (2016)

13

Conclusions Eavesdropping attack Information extraction

T=0: slow down

Message replayattack

Message falsificationattack

Proposed technique is keyless and

transparent to existing receivers

Large dimensional antenna arrays can be

exploited to jam eavesdroppers

Proposed technique can be used to

augment higher layer security techniques

© Robert W. Heath Jr. (2016)

14

Questions?