Physical-Layer Security

Physical Layer Security
05/08/2017
IGNACIO AGUILAR SANCHEZ, ESA
CHARLES SHEEHE, NASA
1
Outline
• Introduction
• Overview of secure channels
– COMSEC
– TRANSEC
– Non-crypto approaches
• Main physical layer security concepts
– Cryptographic spread spectrum
– Wiretap channel
– RF fingerprinting
• Prospects for CCSDS
– White, then Green Book
– Blue Books?
• Preliminary conclusions and follow-on
– Towards a White paper
2
Introduction (1/2)
• Purpose
– Initiate CCSDS discussion and possibly future work
on physical layer security concepts, techniques
and related technologies as a future component of
space mission security engineering portfolio.
• Scope
– Today a short presentation introducing the subject
and its most important elements.
3
Introduction (2/2)
• Motivation
– CCSDS has already tackled link and network layers on its
security engineering effort (e.g. SDLS).
– Certain threats can only be mitigated at physical layer (e.g.
denial of service by deliberate interference, signal
interception).
– But more interestingly physical layer has been
rediscovered to secure communication channels with
security services traditionally assigned to upper (data)
layers (e.g. authentication, confidentiality) and with a
promise of information-theoretic strong security (vs.
computationally-strong) without a key management
burden. Really?
4
Overview of secure channels
5
Cryptographic spread spectrum
6
Wiretap channel approaches
7
RF fingerprinting
8
Prospects for CCSDS
• White Book followed by Green Book
– The subject is broad and complex, touching disciplines covered
by several CCSDS WGs…but could provide useful complements
and/or novel solutions to engineer security on space missions
– Research hot topic for wireless communications security with
strong interest by both civilian and governmental communities
– Deeper understanding of the subject as well as relevant
research results, expected benefits, future mission
requirements, etc. before deciding on any potential standard
– Joint SEC, RFM and S&CC task?
– Cautious but thorough approach!
9
TOWARDS A WHITE PAPER
10
•
Physical Layer Security
White Paper Outline
INTRODUCTION
–
–
INTRODUCTORY SUBSECTIONS
REFERENCES
•
OVERVIEW OF SECURE CHANNELS
•
–
SECURE CHANNELS
–
COMMUNICATIONS SECURITY (COMSEC)
–
TRANSMISSION SECURITY (TRANSEC)
–
NON-CRYPTOGRAHIC APPROACHES
MAIN PHYSICAL LAYER SECURITY CONCEPTS
•
•
CRYPTOGRAPHIC SPREAD SPECTRUM
•
SPREAD SPECTRUM
•
PSEUDORANDOM SEQUENCES
•
ISSUES
WIRETAP CHANNEL APPROACHES
–
–
–
–
–
–
•
TRANSMITTER UNIQUENESS - RF FINGERPRINTING
–
–
–
–
•
THE RADIO IN THE FINGERPRINT
THE REMOVAL OF INPUT FROM THE OUTPUT
COMPARISONS
ISSUES
CONCLUSION
•
•
•
•
•
•
•
PROSPECTS FOR CCSDS
EXPECTED BENEFITS
REQUIREMENTS FOR PROSPECTIVE MISSIONS
RELATIONSHIP WITH EXISTING STANDARDS
IDENTIFIED DEFICIENCIES, FLAWS, AND LIMITATIONS IN EXISTING STANDARDS
GREEN BOOK ON PHYSICAL LAYER SECURITY
BLUE BOOKS
–
–
•
THE WIRETAP CHANNEL
INJECTION OF ARTIFICIAL NOISE
KEY DERIVATION
CODING FOR SECRECY
CHANNEL UNIQUENESS
ISSUES
OVERVIEW
OPTICAL LINK ENCRYPTION AND KEY DERIVATION
CONCLUSION AND RECOMMENDATIONS
11
Physical Layer Security paper process
•
•
•
•
•
•
•
•
Develop Physical Layer paper outline
Public references for each section
Expand each section
Review of Physical Security Layer paper by Security Working
Group
Refine paper structure and content
RF Modulation Working Group buy in and provide feed back
on Physical Security Layer paper
Refine paper
Publish Physical Layer Security paper
12
Physical Layer Security questions / notes
• Introduce the schematic of RF fingerprinting identification
process (transmitter+wireless channel+receiver).
13
Some good readings
•
•
•
•
•
•
•
•
C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4,
pp. 656–715, April 1949.
A. D. Wyner, “The wire-tap channel,” Bell System Technical Journal, vol. 54, no. 8, pp. 1355–1367, October
1975.
“Physical-Layer Security From Information Theory to Security Engineering”, M. Bloch and J. Barros,
Cambridge University Press, 2011.
“Algebraic Shift Register Sequences”, M. Goresky and A. Klapper, Cambridge University Press, 2012.
“Information Theoretic Security”, Yingbian Liang, H. Vincent Poor and Shlomo Shamai (Shitz), Foundations
and Trends in Communications and Information Theory, Vol. 5 Issue 4-5, 2008.
…..
…..
To be completed!
14