Bocan Hu Yan Zhang and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona IEEE CNS 2015 Florence Italy Cooperation in Distributed Wireless Networks Distributed wireless networks rely on the ID: 759350
Download Presentation The PPT/PDF document "PHYVOS: Physical Layer Voting for Secure..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
PHYVOS: Physical Layer Voting for Secure and Fast Cooperation
Bocan
Hu, Yan Zhang, and Loukas Lazos
Department of Electrical and Computer Engineering,
University of Arizona
IEEE CNS 2015, Florence Italy
Slide2Cooperation in Distributed Wireless Networks
Distributed wireless networks rely on the cooperation principle to coordinate network functions Scalability, availability, fault-tolerance, cost-efficiencyE.g.,
9/29/15
2
Cooperative diversity in spectrum sensing for opportunistic networksSpectrum sensing period is specified to 2 sec [IEEE 802.22]
f
1
f
2
f
3
f
4
FC
legacy user
Slide3Cooperation in Distributed Wireless Networks
Distributed wireless networks rely on the cooperation principle to coordinate network functions Scalability, availability, fault-tolerance, cost-efficiencyE.g.,
9/29/15
3
Coordination in networked multi-agent systemsConsensus delay specified in msec range
Slide4Simplest From of Coordination
Exchange of state information – equivalent to a “yes/no” voting processA set of actors u1, u2 ,…, uM cast M binary votes v1, v2 ,…, vME.g., γ = 0 implements a plurality rule
9/29/15
4
Voting outcome
threshold
actor votes
u
1
u
3
u
2
FC
Slide5A sequential process that scales linearly with the number of votersAdditional delay overhead to guarantee integrity Voter authentication and message integrityDelay is further amplified for coordination of channel access
Secure Message-Based Voting
9/29/15
5
time
PHY
header
MAC header
1-bit vote
signature or HMAC
v
1
v
2
v
3
v
4
Slide6A simultaneous process that minimizes the communication and delay overheadRobustness: Voting outcome reflects the true outcome in the presence of external attacks and malicious voters
PHYVOS: PHY Layer-Based Voting Scheme
9/29/15
6
time
PHY
header
MAC header
1-bit
v
ote
s
ignature or HMAC
Slide7Simultaneous Vote Casting
9/29/15
7
time
time
time
time
Fusion Center
f
5
f4
f3
f2
f1
f0
f5
f4
f3
f2
f1
f0
v1
v2
v3
Exploit the subcarrier orthogonality of OFDM
OFDM symbols at the receiver
Slide8Each actor ui is assigned two subcarriers fj and fj+1The FC and ui share random binary sequence based on some pairwise seed siRi(si) = { ri(n) = PRNG(n, si), n = 1,2, . . . }To cast vi, actor ui casts l symbol votes in either fj or fj+1 by transmitting l OFDM symbols ay, k = j + vi XOR ri(n) xk(n) = 0, otherwiseE.g., Ri(si) = { 1, 0, 0, 1 },
Vote Casting Phase
9/29/15
time
random symbol
f
1
f
2
v
i
= 1
8
Slide9Voting Tallying Phase
9/29/15
9
The FC computes the vote of each actor and tallies the votes
subcarrier
. . .
Energy
v
1
v
N-1
.
.
.
No demodulation
f
0
f
1
f
2
f
3
f
4
f
5
f
n-2
fn-1
threshold
v
0
Slide10Adversary Model
9/29/15
10
Injects OFDM signals to change the voting outcome TDoes not launch DoS attack (i.e., a voting outcome must be computable)Secret vote model: Adversary is unware of the voting intent of each actorOpen vote model: Adversary is aware of the voting intent of each actor
u
1
u
3
u
2
Slide11Modification of a Single Vote
9/29/15
11
Adversary injects energy on one of the subcarriers to swing or nullify a vote
time
FC
time
time
f
1
f
0
f
1
f
0
f
1
f
0
+
adversary
v
oter
Slide12Secret vote model: δ: # of attacked votes μ: winning marginM: # of voters, γ: decision threshold (e.g., γ = 0) p: Pr[vi = e], n1: (M+γ+μ)/2Open vote model:
YES
Modification of the Voting Outcome
9/29/15
12
We can
select the number of symbol votes
to drive the above probabilities to any desired value
NO
γ
μ
δ
Slide13Robustness for the Secret Vote Model
9/29/15
13
20 voters, plurality vote, adversary attacks δ = N/2 + μ votes
Slide14Robustness for the Open Vote Model
9/29/15
14
20 voters, plurality vote, adversary attacks δ = N/2 + μ votes
Slide15MV
: message-based voting using 802.11g (52 subcarriers, 6 bits per symbol, 13 symbol gap between messages)DMV = 20 M – 13 OFDM symbolsPHYVOS: up to 26 votes can votesimultaneously using l OFMD symbolsDPHYVOS = ceil (M/26)
Voting Overhead
9/29/15
15
PHYheader
MAC header
1-bitvote
HMAC
CRC
5
30
4
32
1
Slide16Frequency Synchronization
9/29/15
16
Carrier frequency offset (CFO) effect on demodulation: Subcarriers are not orthogonal, causing ICI Symbols at each subcarrier appear with arbitrary rotation in the constellation map
PHYVOS:
No preamble
is present to perform CFO synchronization
No
demodulation
necessary, so constellation point rotation does not affect vote tallying
No ICI as long as freq. misalignment stays
below subcarrier spacing
In 802.11g subcarrier spacing is 315Khz while CFO is < 100 KHz
Time Synchronization
Time misalignment: propagation delay and device clock drifts. Cyclic prefix (0.8 μsec) is applied to normal OFDM symbol.
9/29/15
17
Increasing the CP to account for synchronization error.
Cast
a symbol vote in two symbol durations.
Slide189/29/15
18
4 NI USRP 2921 devicesCarrier frequency: 2.4 GHz# of subcarriers: 64ConfigurationsTopology A: equidistantTopology B: varying distances
PHYVOS Implementation on USRPs
Slide199/29/15
19
Selection of Vote Detection Threshold
Three voters assigned at 1st, 5th and 9th subcarrier casting 1,000 votes using BPSK modulation
Topology A
: voters are placed 5
ft from FC
Topology B
: voters are placed 5/10/15
ft
from FC
Slide20MAC for Multi-channel Networks ( MMAC)
9/29/15
20
Received Power Per Subcarrier
Detection threshold set to -80dBm
Topology
A
Topology B
Slide21MAC for Multi-channel Networks ( -MMAC)
9/29/15
21
Voting in the Presence of an Adversary
Voter 1 assigned 1st and 2nd subcarrierVoter 2 assigned 5th and 6th subcarrierAdversary injected energy to subcarriers at random
Topology
A
Topology B
Slide22Concluding Remarks
Contributions Summary Designed a PHY-layer based voting scheme for fast coordination Voting is performed without explicit message exchange Significantly lower communication and delay overheads compared to message based voting Robust to vote manipulation without expensive cryptographyFuture Work PHYVOS robustness and correctness under varying channel conditions Extend PHYVOS to accommodate x-ary voting Investigate the application of PHY-layer voting to fully distributed consensus algorithms (No Fusion Center)
9/29/15
22
Slide23Thank you!
9/29/15
23