Award Abstract # 1525705
CIF: Small: Cooperative Interference Engineering for Network Secrecy

NSF Org: CCF
Division of Computing and Communication Foundations
Recipient: MASSACHUSETTS INSTITUTE OF TECHNOLOGY
Initial Amendment Date: August 26, 2015
Latest Amendment Date: August 10, 2020
Award Number: 1525705
Award Instrument: Standard Grant
Program Manager: Phillip Regalia
pregalia@nsf.gov
 (703)292-2981
CCF
 Division of Computing and Communication Foundations
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2015
End Date: August 31, 2021 (Estimated)
Total Intended Award Amount: $175,000.00
Total Awarded Amount to Date: $175,000.00
Funds Obligated to Date: FY 2015 = $175,000.00
History of Investigator:
  • Moe Win (Principal Investigator)
    moewin@mit.edu
Recipient Sponsored Research Office: Massachusetts Institute of Technology
77 MASSACHUSETTS AVE
CAMBRIDGE
MA  US  02139-4301
(617)253-1000
Sponsor Congressional District: 07
Primary Place of Performance: Massachusetts Institute of Technology
77 Massachusetts Avenue
Cambridge
MA  US  02139-4307
Primary Place of Performance
Congressional District:
07
Unique Entity Identifier (UEI): E2NYLCDML6V1
Parent UEI: E2NYLCDML6V1
NSF Program(s): Comm & Information Foundations
Primary Program Source: 01001516DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7923, 7935
Program Element Code(s): 779700
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

The ability to exchange secret information, to guarantee privacy, and to provide authenticity forms the basis for trust in today's information society. In contrast to communications via wires, the use of a wireless medium is highly susceptible to eavesdropping due to its broadcast nature. To overcome this challenge, it is imperative to exploit the intrinsic properties of the wireless propagation medium. A key observation for exploiting such properties is that the broadcast nature generates contrasting effects: it makes the secrecy information from a certain legitimate transmitter vulnerable to malicious interception, but at the same time, it enables other legitimate partners to impede the capability of eavesdropping receivers via interference. However, the concurrent effect of interference on both eavesdropping receivers and legitimate receivers has not been thoroughly investigated. This calls for research on carefully engineering the network interference to fully harness its potential for wireless secrecy.

This project aims at developing cooperative interference engineering strategies that coordinate the transmission and reception of multiple legitimate partners to generate desirable aggregate interference for wireless secrecy protection. New techniques will be designed to impede the eavesdropper's capability while having little effect on the legitimate receivers. Specifically, this research aims to: (1) characterize the fundamental limit of cooperative interference engineering for controlling the aggregate interference injected into a wireless network; (2) set up a theoretical foundation for the design of cooperative interference engineering techniques; and (3) evaluate the performance of cooperative interference engineering techniques and their benefits to network secrecy. The proposed research combines various theories in communication, information, algebraic geometry, and stochastic geometry, serving as a foundation for the design of wireless networks with a new level of secrecy protection.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 13)
G. Chisci, A. Conti, L. Mucchi, M. Z. Win "Intrinsic Secrecy in Inhomogeneous Stochastic Networks" IEEE Transactions on Networking , v.27 , 2019 , p.1291 10.1109/TNET.2019.2911126
Giovanni Chisci and Hesham ElSawy and Andrea Conti and Mohamed-Slim Alouini and Moe Z. Win "Uncoordinated Massive Wireless Networks: Spatiotemporal Models and Multiaccess Strategies" IEEE Transactions on Networking , v.27 , 2019 , p.918 10.1109/TNET.2019.2892709
Giovanni Chisci, Andrea Conti, Lorenzo Mucchi, and Moe Z. Win "Intrinsic Secrecy in Inhomogeneous Stochastic Networks" IEEE/ACM TRANSACTIONS ON NETWORKING , v.27 , 2019 , p.1291 10.1109/TNET.2019.2911126
Giovanni Chisci, Andrea Conti, Lorenzo Mucchi, and Moe Z. Win "Maximum Secrecy Rate in Inhomogeneous Poisson Process" International Conference on Acoustics, Speech, and Signal Processing , 2017 10.1109/ICASSP.2017.7952527
Giovanni Chisci, Hesham ElSawy, Andrea Conti, Mohamed-Slim Alouini, and Moe Z. Win "Latency in Downlink Cellular Networks with Random Scheduling" IEEE International Conference on Communications (ICC) , 2019 10.1109/ICC.2019.8761076
Giovanni Chisci, Hesham ElSawy, Andrea Conti, Mohamed-Slim Alouini, and Moe Z. Win "Uncoordinated Massive Wireless Networks: Spatiotemporal Models and Multiaccess Strategies" IEEE/ACM TRANSACTIONS ON NETWORKING , v.27 , 2019 , p.918 10.1109/TNET.2019.2892709
Guido Carlo Ferrante, Tony Q. S. Quek, and Moe Z. Win "Revisiting the Capacity of Noncoherent Fading Channels in mmWave System" IEEE TRANSACTIONS ON COMMUNICATIONS , v.65 , 2017 , p.3259 10.1109/TCOMM.2017.2693279
Hesham ElSawy, Ahmed Sultan-Salem, Mohamed-Slim Alouini, and Moe Z. Win "Modeling and Analysis of Cellular Networks Using Stochastic Geometry: A Tutorial" IEEE COMMUNICATIONS SURVEYS & TUTORIALS , v.19 , 2017 , p.167 10.1109/COMST.2016.2624939
Liangzhong Ruan, Andrea Conti, and Moe Z. Win "Unified Interference Engineering for Wireless Information Secrecy" IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , v.36 , 2018 , p.1579 10.1109/JSAC.2018.2825558
Liangzhong Ruan, Vincent K. N. Lau, and Moe Z. Win "Generalized Interference AlignmentPart II: Application to Wireless Secrecy" IEEE TRANSACTIONS ON SIGNAL PROCESSING , v.64 , 2016 , p.2688 10.1109/TSP.2015.2474295
Liangzhong Ruan, Vincent K. N. Lau, and Moe Z. Win "Generalized Interference AlignmentPart I: Theoretical Framework" IEEE TRANSACTIONS ON SIGNAL PROCESSING , v.64 , 2016 , p.2675 10.1109/TSP.2015.2474301
(Showing: 1 - 10 of 13)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

This research focuses on providing an additional level of secrecy to complement the already existent methods for secrecy in wireless communications by exploiting the physical nature of the wireless propagation medium. Due to the broadcast nature of the channel, the use of the wireless medium is highly susceptible to eavesdropping. However, the broadcast nature also generates a contrasting effect: it enables legitimate nodes to impede the eavesdropping receivers via interference. The goal of this project is to engineer network interference for secrecy protection.

In the first part of the project, we have developed a theoretical framework to analyze the feasibility of interference engineering strategies, that is, to analyze and quantify the impact of interference signals on eavesdropping receivers. Moreover, we evaluated the tradeoff between the disruption of eavesdroppers and the effect on legitimate receivers of the interference signals. Subsequently, we proposed an interference engineering strategy that unifies various existing strategies, such as zero-forcing beamforming, artificial noise generation, cooperative jamming, and interference alignment to efficiently protect information secrecy in networks with heterogenous topology and node capability. We analyzed the performance of the proposed interference engineering strategy for large-scale stochastic networks.

In the second part of the project, we developed a framework for the design and analysis of inhomogeneous wireless networks with intrinsic secrecy. We characterized the impact of network interference as a function of received signal-to-interference ratio for different receiver selection strategies. Based on this characterization, we introduced local and global secrecy metrics for characterizing the level of intrinsic secrecy in inhomogeneous wireless networks from a link and a network perspective. Moreover, we combined stochastic geometry and queueing theory to develop a spatiotemporal model for the design and analysis of uncoordinated massive wireless networks.

In the last part of the project, we analyzed and proposed strategies for the mitigation of interference on legitimate nodes in the network. These serve as a complement to our previously developed secrecy strategies, that are of general use for massive wireless networks. As the number of nodes increases, the contention over communication resources, such as bandwidth and time slots, becomes stronger, leading to potential interference among different nodes. Interference causes symbol detection errors, packet losses, and communication delays, thus degrading the network performance significantly. Therefore, it is important to manage the contention and interference carefully. Based on time-division and code-division techniques, we devised strategies that reduce the occurrences of network interference and/or reduce the impact of these on legitimate nodes in the network. Experimental results demonstrate that our proposed mitigation strategies can effectively reduce the occurrence of interference in the radar network, and provide improved tracking performance.


Last Modified: 12/07/2021
Modified by: Moe Win

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page