With billions of people worldwide accustomed to daily, hourly or even constant use of wireless devices for a myriad of activities in their lives, wireless network security is among few areas of paramount importance in modern civilization. The Symposium on Signal Processing for Wireless Network Security is aimed to attract researchers from all backgrounds to come together to share their latest ideas and findings on this theme, and to promote rapid development of truly useful technologies for wireless network security. All topics of signal processing methods and theories for wireless network security issues, such as authenticity, confidentiality, integrity and availability, are included.
H. Vincent Poor
The emerging Internet of Things (IoT) has several salient characteristics that differentiate it from existing wireless networking architectures. These include the deployment of very large numbers of (possibly) low-complexity terminals; the need for low-latency, short-packet communications (e.g., to support automation); light or no infrastructure; and primary applications of data gathering, inference and control. These characteristics shape the issue of security in the IoT, and an important aspect of this issue is the need for new fundamental insights about security that address these characteristics. This talk will discuss recent research advances along these lines. In particular, results that examine security in source coding, data transmission and inference within the above setting will be described. This is an evolving field, and several open problems will also be discussed.
H. Vincent Poor is the Michael Henry Strater University Professor of Electrical Engineering at Princeton University. From 1977, and until joining the Princeton faculty in 1990, he was on the faculty of the University of Illinois. During 2006 – 2016, he served as Dean of Princeton’s School of Engineering and Applied Science. He has also held visiting positions at several other universities, including most recently at Berkeley and Cambridge. Dr. Poor’s research interests are in signal processing and information theory, and their applications in wireless networks, energy systems and related fields. He is a member of the National Academy of Engineering and the National Academy of Sciences, and is a foreign member of the Chinese Academy of Sciences, the Royal Society, and other national and international academies. He received the Society Award of the IEEE Signal Processing Society in 2011, and the IEEE Alexander Graham Bell Medal in 2017.
Brian M. Sadler
Army Research Laboratory (ARL)
We describe a general framework for designing and embedding a fingerprint at the physical layer of a wireless network to achieve authentication with enhanced security and stealth. Fingerprint embedding is a key-aided process of superimposing a low-power tag to the primary message waveform for the purpose of authenticating the transmission. The tag is uniquely created from the message and key, and successful authentication is achieved when the correct tag is detected by the receiver. This enables control over performance trade-offs by design, and low-power fingerprints enhance security by making the authentication tags much less accessible to an adversary (Eve). Privacy analysis shows how Eve can be forced into difficult detection regimes, and secrecy analysis demonstrates that Eve’s uncertainty about the secret key is not readily reduced by an increase in her computational ability. In addition, the fingerprint embedding framework easily generalizes to create an authenticated communications side-channel for minimal cost. Side-channel information is conveyed to the receiver through the transmitter’s choice of tag from a secret codebook generated by the primary message and a shared secret key set. A linear coding scheme is introduced which enables tradeoffs among the performance goals of authentication, side-channel rate, secrecy, and privacy. Practical designs are readily achieved, and software-defined radio experiments validate the theory and demonstrate how the use of a set of secret keys for fingerprint embedding can, at minimal cost, allow secret and private side-channel communications, while simultaneously providing authentication with enhanced security.
Brian M. Sadler is the Army Senior Scientist for Intelligent Systems at the Army Research Laboratory (ARL) in Adelphi, MD, is a Fellow of ARL, a Fellow of the IEEE, and an IEEE Signal Processing Society Distinguished Lecturer for 2017-2018. He has been an associate or guest editor for a variety of journals including the IEEE Transactions on Signal Processing, EURASIP Signal Processing, IEEE SP Letters, IEEE SP Magazine, the International Journal of Robotics Research, and Autonomous Robots. He received Best Paper Awards from the IEEE Signal Processing Society in 2006 and 2010, several ARL and Army R&D awards, and a 2008 Outstanding Invention of the Year Award from the University of Maryland. His research interests include information science, wireless networked and autonomous systems, human-machine teaming, sensing, and mixed-signal integrated circuit architectures, and he has more than 400 publications in these areas.
|Tuesday, November 27|
|08:30 - 09:30|
|Plenary PLEN-1: Vincent Poor: "Security in the Internet of Things: Information Theoretic Insights"|
|09:40 - 10:40|
|DL DL-WNS.1: Brian Sadler: "Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding"|
|11:00 - 12:30|
|WNS-L.1: Wireless Network Security I|
|14:00 - 15:30|
|WNS-L.2: Wireless Network Security II|
|15:50 - 17:50|
|WNS-L.3: Wireless Network Security III - Invited Talks|
Submissions are welcome on topics including:
Prospective authors are invited to submit full-length papers (up to 4 pages for technical content including figures and possible references, and with one additional optional 5th page containing only references) and extended abstracts (up to 2 pages, for paper-less industry presentations and Ongoing Work presentations).. Manuscripts should be original (not submitted/published anywhere else) and written in accordance with the standard IEEE double-column paper template. Accepted full-length papers will be indexed on IEEE Xplore. Accepted abstracts will not be indexed in IEEE Xplore, however the abstracts and/or the presentations will be included in the IEEE SPS SigPort. Accepted papers and abstracts will be scheduled in lecture and poster sessions.
|Paper Submission Deadline|
|Review Results Announced||September 7, 2018|
|Camera-Ready Papers Due||September 24, 2018|
|November 5, 2018||Hotel Room Reservation Deadline|