Crypto-Aided MAP Detection and Mitigation of False Data in Wireless Relay Networks
Total Page:16
File Type:pdf, Size:1020Kb
Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2019 Crypto-aided MAP detection and mitigation of false data in wireless relay networks Xudong Liu Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Communication Commons Recommended Citation Liu, Xudong, "Crypto-aided MAP detection and mitigation of false data in wireless relay networks" (2019). Graduate Theses and Dissertations. 17730. https://lib.dr.iastate.edu/etd/17730 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Crypto-aided MAP detection and mitigation of false data in wireless relay networks by Xudong Liu A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Electrical Engineering (Communications and Signal Processing) Program of Study Committee: Sang Wu Kim, Major Professor Yong Guan Chinmay Hegde Thomas Daniels Long Que The student author, whose presentation of the scholarship herein was approved by the program of study committee, is solely responsible for the content of this dissertation. The Graduate College will ensure this dissertation is globally accessible and will not permit alterations after a degree is conferred. Iowa State University Ames, Iowa 2019 Copyright c Xudong Liu, 2019. All rights reserved. ii DEDICATION I would like to dedicate this thesis to my beloved wife Yu Wang, without her emotional support I would not be able to complete this work. Also I want to express my sincere thanks to my parents for their fully support and help during the time of my doctoral program. iii TABLE OF CONTENTS Page LIST OF TABLES . vi LIST OF FIGURES . vii ACKNOWLEDGMENTS . ix ABSTRACT . .x CHAPTER 1. INTRODUCTION . .1 1.1 Research Motivation and Background . .1 1.2 Literature Review . .2 1.3 Research Objectives . .4 1.4 Outline of Thesis . .5 1.5 References . .5 CHAPTER 2. BAYESIAN TEST FOR DETECTING FALSE DATA INJECTED PACKET IN WIRELESS RELAY NETWORKS . .9 2.1 Overview . .9 2.2 System Model . .9 2.3 Bayesian Test . 11 2.3.1 Sufficient Statistic . 11 2.3.2 Bayesian Test . 12 2.4 Probability of Detection Error . 14 2.4.1 Probability of False Alarm . 14 2.4.2 Probability of Missed Detection . 15 2.4.3 Asymptotical Analysis . 15 2.5 Numerical Results . 18 2.6 Conclusion . 20 2.7 Appendix: Proof of Proposition 1 . 21 2.8 References . 25 CHAPTER 3. ENHENCE BAYESIAN TEST DETECTION PERFORMANCE WITH CRYP- TOGRAPHY FOR SHORT LENGTH PACKET . 27 3.1 Overview . 27 3.2 Message Authentication Code . 27 3.2.1 Probability of False Alarmed and Missed Detection for MAC . 29 iv 3.3 Crypto-Physical Integrity Check . 30 3.3.1 MAP Combining Rule . 31 3.3.2 Probability of Detection Error . 32 3.4 Numerical Results . 33 3.5 Conclusion . 35 3.6 References . 35 CHAPTER 4. PHYSICAL LAYER MAP DETECTION OF FALSE DATA INJECTION IN WIRELESS DATA AGGREGATION NETWORKS . 36 4.1 Introduction . 36 4.2 System Model . 37 4.3 The Physical-Layer MAP Detection . 40 4.3.1 Sufficient Statistic . 40 4.3.2 General MAP Test . 41 4.3.3 The Best Strategy for Adversary's in choosing Fi ................ 43 4.4 Probability of Detection Error: Physical-Layer MAP Test . 47 4.4.1 Probability of False Alarm . 48 4.4.2 Probability of Missed Detection . 48 4.4.3 Probability of Detection Error . 50 4.4.4 Upbound of Probability of Detection Error . 50 4.5 Selective MAP Test . 52 4.5.1 Probability of False Alarm . 54 4.5.2 Probability of Missed Detection . 55 4.5.3 Average Probability of Detection Error . 56 4.6 Numerical Results . 57 4.7 Conclusion . 63 4.8 Appendix: The Exact Expression of Probability of False Alarm and Missed Detection for (4.40).......................................... 63 4.8.1 Probability of False Alarm . 64 4.8.2 Probability of Missed Detection . 65 4.9 References . 67 CHAPTER 5. PACKET RECOVERY OF PHYSICAL LAYER MAP TEST IN WIRELESS RELAY NETWORKS . 68 5.1 Introduction . 68 5.2 Likelihood Ratio Test . 68 5.3 Normalized Throughput Analysis for Different Schemes . 71 5.3.1 Compared with Existing Tracing Bits techniques . 73 5.4 Numerical Results . 76 5.5 Conclusion . 78 5.6 Appendix . 78 5.7 References . 79 v CHAPTER 6. ENHENCE MAP TEST PERFORMANCE WITH CRYPTOGRAPHY FOR SHORT LENGTH, AGGREGATED DATA NETWORKS . 80 6.1 Introduction . 80 6.2 Cryptographic Check . 80 6.2.1 Probability of Detection Error for Cryptographic Check . 81 6.3 Crypto-Aided MAP Test . 82 6.3.1 a priori information . 83 6.3.2 MAP combining rule . 84 6.4 Probability of Detection error: Crypto-Aided MAP Test . 86 6.5 Selective Crypto-Aided MAP Test . 87 6.5.1 Average Probability of Detection Error . 89 6.5.2 The optimal choice of N 0 ............................. 90 6.6 Numerical Results . 91 6.7 Conclusion . 94 6.8 References . 96 vi LIST OF TABLES Page Table 2.1 Symbols. 11 Table 3.1 MAP combining rule. 32 Table 4.1 List of notations and terms. 39 Table 6.1 MAP combining rule in crypto-aided MAP test. 86 vii LIST OF FIGURES Page Figure 2.1 Two-hop wireless relay transmission. 10 Figure 2.2 Probability mass function of W (Z) given H0 and H1; e = 0:1. 16 Figure 2.3 Probability of missed detection, PM , versus probability of false alarm, PF , for different values of W (F )=n; (127,64) BCH code, dmin = 21, n = 127, e = 0:1........................................ 19 Figure 2.4 Probability of missed detection, PM , and probability of false alarm, PF , versus the fraction of bits modified, W (F )=n; (127,64) BCH code, e = 0:1, β = 0:9. ...................................... 20 Figure 2.5 Probability of detection error versus BER between S and D, e, for different (n; k) BCH codes; β = 0:9............................. 21 Figure 3.1 The message authentication code example. 28 Figure 3.2 Frame structure: (a) cryptographic integrity check, (b) crypto-physical in- tegrity check. h(Xi) is the MAC tag for Xi and h(X1;X2;X3; ··· ;XN ) is the MAC tag for X1;X2;X3; :::; XN ....................... 29 Figure 3.3 Crypto-Physical Integrity Check. 30 Figure.