Secret Key Agreement With Large Antenna Arrays Under the Pilot Contamination Attack

We present a secret key agreement (SKA) protocol for a multi-user time-division duplex system where a base-station (BS) with a large antenna array (LAA) shares secret keys with users in the presence of non-colluding eavesdroppers. In the system, when the BS transmits random sequences to legitimate users for sharing common randomness, the eavesdroppers can attempt the pilot contamination attack (PCA) in which each of eavesdroppers transmits its target user's training sequence in hopes of acquiring possible information leak by steering beam towards the eavesdropper. We show that there exists a crucial complementary relation between the received signal strengths at the eavesdropper and its target user. This relation tells us that the eavesdropper inevitably leaves a trace that enables us to devise a way of measuring the amount of information leakage to the eavesdropper even if PCA parameters are unknown. To this end, we derive an estimator for the channel gain from the BS to the eavesdropper and propose a rate-adaptation scheme for adjusting the length of secret key under the PCA. Extensive analysis and evaluations are carried out under various setups, which show that the proposed scheme adequately takes advantage of the LAA to establish the secret keys under the PCA.

[1]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[2]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[3]  G. Ferrari,et al.  New bounds for the Marcum Q-function , 2002, IEEE Trans. Inf. Theory.

[4]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[5]  Vincent Y. F. Tan,et al.  The Sender-Excited Secret Key Agreement Model: Capacity, Reliability, and Secrecy Exponents , 2011, IEEE Transactions on Information Theory.

[6]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[7]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[8]  Wei Yu,et al.  Rateless Slepian-Wolf Codes , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..

[9]  Stark C. Draper,et al.  Exploiting Channel Diversity in Secret Key Generation From Multipath Fading Randomness , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[11]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[12]  Jinho Choi Optimal Combining and Detection: Statistical Signal Processing for Communications , 2010 .

[13]  Raymond Knopp,et al.  A practical method for wireless channel reciprocity exploitation through relative calibration , 2005, Proceedings of the Eighth International Symposium on Signal Processing and Its Applications, 2005..

[14]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[15]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[16]  Sriram Vishwanath,et al.  Channel Estimation and Linear Precoding in Multiuser Multiple-Antenna TDD Systems , 2008, IEEE Transactions on Vehicular Technology.

[17]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[18]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[19]  Wade Trappe,et al.  Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.

[20]  Björn E. Ottersten,et al.  Detection of pilot contamination attack using random training and massive MIMO , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[21]  Ning Zhang,et al.  Cooperative Key Agreement for Wireless Networking: Key Rates and Practical Protocol Design , 2014, IEEE Transactions on Information Forensics and Security.

[22]  Adeel Razi,et al.  Secrecy Sum-Rates for Multi-User MIMO Regularized Channel Inversion Precoding , 2012, IEEE Transactions on Communications.

[23]  Xiangyun Zhou,et al.  Pilot Contamination for Active Eavesdropping , 2012, IEEE Transactions on Wireless Communications.

[24]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[25]  Mounir Ghogho,et al.  Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.

[26]  Andrew Thangaraj,et al.  LDPC-based secret key agreement over the Gaussian wiretap channel , 2006, 2006 IEEE International Symposium on Information Theory.

[27]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[28]  Vijay K. Bhargava,et al.  Secure transmission in multi-cell massive MIMO systems , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[29]  Dake He,et al.  Rateless Slepian-Wolf Coding Based on Rate Adaptive Low-Density-Parity-Check Codes , 2007, 2007 IEEE International Symposium on Information Theory.

[30]  Haralabos C. Papadopoulos,et al.  Techniques for Multi-User MIMO with Two-Way Training , 2008, 2008 IEEE International Conference on Communications.

[31]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[32]  Thomas L. Marzetta,et al.  Pilot Contamination and Precoding in Multi-Cell TDD Systems , 2009, IEEE Transactions on Wireless Communications.

[33]  Thomas L. Marzetta,et al.  Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas , 2010, IEEE Transactions on Wireless Communications.

[34]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[35]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[36]  Onur Ozan Koyluoglu,et al.  Polar coding for secure transmission and key agreement , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[37]  Mohamed-Slim Alouini,et al.  Exponential-type bounds on the generalized Marcum Q-function with application to error probability analysis over fading channels , 2000, IEEE Trans. Commun..

[38]  John M. Shea,et al.  Secret-Sharing LDPC Codes for the BPSK-Constrained Gaussian Wiretap Channel , 2011, IEEE Transactions on Information Forensics and Security.

[39]  Alexander Vardy,et al.  Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.

[40]  Kai-Kit Wong,et al.  A Closed-Form Power Allocation for Minimizing Secrecy Outage Probability for MISO Wiretap Channels via Masked Beamforming , 2012, IEEE Communications Letters.

[41]  Jinho Choi,et al.  Perfect Secrecy Over Binary Erasure Wiretap Channel of Type II , 2012, IEEE Transactions on Information Forensics and Security.

[42]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[43]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[44]  Jinho Choi,et al.  Secret key agreement under an active attack in MU-TDD systems with large antenna arrays , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[45]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[46]  Mikael Skoglund,et al.  Secret-key agreement over a non-coherent block-fading MIMO wiretap channel , 2012, 2012 IEEE Information Theory Workshop.

[47]  Mikael Skoglund,et al.  Nested Polar Codes for Wiretap and Relay Channels , 2010, IEEE Communications Letters.

[48]  Vijay K. Bhargava,et al.  Secure Transmission in Multicell Massive MIMO Systems , 2014, IEEE Transactions on Wireless Communications.

[49]  Vincent Y. F. Tan,et al.  The sender-excited secret key agreement model: Capacity theorems , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[50]  Jinho Choi,et al.  Robustness of secret key agreement protocol with massive MIMO under pilot contamination attack , 2013, 2013 International Conference on ICT Convergence (ICTC).

[51]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[52]  M. L. Eaton Multivariate statistics : a vector space approach , 1985 .

[53]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.

[54]  Thomas L. Marzetta,et al.  BLAST training : Estimating Channel Characteristics for High-Capacity Space-Time Wireless , 1999 .