Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3448300.3468228acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article
Public Access

SELEST: secure elevation estimation of drones using MPC

Published: 28 June 2021 Publication History

Abstract

Drones are increasingly associated with incidents disturbing air traffic at airports, invading privacy, and even terrorism. Wireless Direction of Arrival (DoA) techniques, such as the MUSIC algorithm, can localize drones, but deploying a system that systematically localizes RF emissions can lead to intentional or unintentional (e.g., if compromised) abuse. Multi-Party Computation (MPC) provides a solution for controlled computation of the elevation of RF emissions, only revealing estimates when some conditions are met, such as when the elevation exceeds a specified threshold. However, we show that a straightforward implementation of MUSIC, which relies on costly computation of complex matrix operations such as eigendecomposition, in state of the art MPC frameworks is extremely inefficient requiring over 20 seconds to achieve the weakest security guarantees. In this work, we develop a set of MPC optimizations and extensions of MUSIC. We extensively evaluate our techniques in several MPC protocols achieving a speedup of 300-500 times depending on the security model and specific technique used. For instance a Malicious Shamir execution providing security against malicious adversaries enables 536 DoA estimations per second, making it practical for use in real-world setups.

References

[1]
Chris Abbott, Matthew Clarke, Steve Hathorn, and Scott Hickie. 2016. Hostile Drones: The Hostile Use of Drones by Non-State Actors against British Targets. https://css.ethz.ch/en/services/digital-library/publications/publication.html/195685
[2]
Elias Aboutanios, Aboulnasr Hassanien, Amr El-Keyi, Youssef Nasser, and Sergiy A. Vorobyov. 2017. Advances in DOA Estimation and Source Localization. International Journal of Antennas and Propagation (2017).
[3]
EU Aviation Safety Agency. 2021. Civil drones regulations. https://www.easa.europa.eu/domains/civil-drones-rpas Retrieved 3-20-2021.
[4]
aws.amazon.com. 2021. Amazon EC2 On-Demand Pricing. https://aws.amazon.com/ec2/pricing/on-demand/ Retrieved 3-20-2021.
[5]
aws.amazon.com. 2021. Announcing improved networking performance for Amazon EC2 instances. https://aws.amazon.com/about-aws/whats-new/2017/09/announcing-improved-networking-performance-for-amazon-ec2-instances/ Retrieved 3-20-2021.
[6]
Ettus Knowledge Base. 2016. GPSDO Selection Guide --- Ettus Knowledge Base,. http://kb.ettus.com/GPSDO_Selection_Guide
[7]
Ettus Knowledge Base. 2020. OctoClock CDA-2990 --- Ettus Knowledge Base,. https://kb.ettus.com/OctoClock_CDA-2990 Retrieved 3-20-2021.
[8]
Aniqua Baset, Christopher Becker, Kurt Derr, Samuel Ramirez, Sneha Kumar Kasera, and Aditya Bhaskara. 2019. Towards Wireless Environment Cognizance Through Incremental Learning. In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).
[9]
Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '91).
[10]
Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88).
[11]
Lennart Braun, Daniel Demmler, Thomas Schneider, and Oleksandr Tkachenko. 2020. MOTION - A Framework for Mixed-Protocol Multi-Party Computation. Cryptology ePrint Archive, Report 2020/1137. https://eprint.iacr.org/2020/1137.
[12]
Ran Canetti. 2000. Security and Composition of Multiparty Cryptographic Protocols. J. Cryptol. (2000).
[13]
Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, and Ariel Nof. 2018. Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. In Advances in Cryptology - CRYPTO 2018.
[14]
Pei-Jung Chung, Mats Viberg, and Jia Yu. 2014. Chapter 14 - DOA Estimation Methods and Algorithms. In Academic Press Library in Signal Processing: Volume 3.
[15]
M. P. Clark and L. L. Scharf. 1994. Two-dimensional modal analysis based on maximum likelihood. IEEE Transactions on Signal Processing (1994).
[16]
Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, and Nigel P. Smart. 2012. Practical Covertly Secure MPC for Dishonest Majority - or: Breaking the SPDZ Limits. Cryptology ePrint Archive, Report 2012/642. https://eprint.iacr.org/2012/642.
[17]
I. Damgard, V. Pastro, N.P. Smart, and S. Zakarias. 2011. Multiparty Computation from Somewhat Homomorphic Encryption. Cryptology ePrint Archive, Report 2011/535. https://eprint.iacr.org/2011/535.
[18]
dji.com. 2021. DJI AEROSCOPE. https://www.dji.com/aeroscope Retrieved 3-20-2021.
[19]
Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, and Peter Scholl. 2020. Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits. Cryptology ePrint Archive, Report 2020/338. https://eprint.iacr.org/2020/338.
[20]
faa.gov. 2021. B4UFLY Mobile App. https://www.faa.gov/uas/recreational_fliers/where_can_i_fly/b4ufly/ Retrieved 3-20-2021.
[21]
J. E. Fernandez del Rio and M. F. Catedra-Perez. 1997. The matrix pencil method for two-dimensional direction of arrival estimation employing an L-shaped array. IEEE Transactions on Antennas and Propagation (1997).
[22]
Eran Fishler and H. Vincent Poor. 2005. Estimation of the number of sources in unbalanced arrays via information theoretic criteria. IEEE Transactions on Signal Processing (2005).
[23]
foremtech.com. 2021. TrueView Radar. https://fortemtech.com/products/trueview-radar/ Retrieved 3-20-2021.
[24]
J. G. F. Francis. 1961. The QR Transformation A Unitary Analogue to the LR Transformation---Part 1. Comput. J. (1961).
[25]
Oded Goldreich. 2004. Foundations of Cryptography.
[26]
Oded Goldreich, Silvio Micali, and Avi Wigderson. [n.d.]. A high-level approach to computer document formatting, In How to Play any Mental Game or a Completeness Theorem for Protocols with Honest Majority. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing.
[27]
Nicholas J. Higham. 1992. Stability of a Method for Multiplying Complex Matrices with Three Real Matrix Multiplications. SIAM J. Matrix Anal. Appl. (1992).
[28]
Yingbo Hua and Tapan K.Sarka. [n.d.]. ([n. d.]).
[29]
wsj.com Jack Nicas. 2019. Criminals, Terrorists Find Uses for Drones, Raising Concerns. https://www.wsj.com/articles/criminals-terrorists-find-uses-for-drones-raising-concerns-1422494268
[30]
wsj.com Joseph De Avila. 2019. New York Police Seek Authority to Take Down Drones. https://www.wsj.com/articles/new-york-police-seek-authority-to-take-down-drones-11550419320
[31]
Marcel Keller. 2020. MP-SPDZ: A Versatile Framework for MultiParty Computation. Cryptology ePrint Archive, Report 2020/521. https://eprint.iacr.org/2020/521.
[32]
Marcel Keller, Emmanuela Orsini, and Peter Scholl. 2016. MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). Association for Computing Machinery.
[33]
Marcel Keller, Valerio Pastro, and Dragos Rotaru. 2017. Overdrive: Making SPDZ Great Again. Cryptology ePrint Archive, Report 2017/1230. https://eprint.iacr.org/2017/1230.
[34]
B. Knott, S. Venkataraman, A.Y. Hannun, S. Sengupta, M. Ibrahim, and L.J.P. van der Maaten. 2020. CrypTen: Secure Multi-Party Computation Meets Machine Learning. In Proceedings of the NeurIPS Workshop on Privacy-Preserving Machine Learning.
[35]
Donald E. Knuth. 2014. Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd ed.).
[36]
Markus Krueckemeier, Fabian Schwartau, Carsten Monka-Ewe, and Joerg Schoebel Technische. 2019. Synchronization of Multiple USRP SDRs for Coherent Receiver Applications. In 2019 Sixth International Conference on Software Defined Systems.
[37]
V.N. Kublanovskaya. 1962. On some algorithms for the solution of the complete eigenvalue problem. U. S. S. R. Comput. Math. and Math. Phys. (1962).
[38]
Andrei Lapets, Frederick Jansen, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, and Azer Bestavros. 2018. Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS '18).
[39]
R. Levorato and E. Pagello. 2015. DOA Acoustic Source Localization in Mobile Robot Sensor Networks. In 2015 IEEE International Conference on Autonomous Robot Systems and Competitions.
[40]
Yehuda Lindell. 2020. Secure Multiparty Computation. Commun. ACM (2020).
[41]
Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, and Sameer Wagh. 2021. Rabbit: Efficient Comparison for Secure Multi-Party Computation. Cryptology ePrint Archive, Report 2021/119. https://eprint.iacr.org/2021/119.
[42]
BBC News. 2018. Gatwick Airport: Drones ground flights. https://www.bbc.com/news/uk-england-sussex-46623754
[43]
Arogyaswami Paulraj, R. Roy, and Thomas Kailath. 1985. Estimation Of Signal Parameters Via Rotational Invariance Techniques- Esprit. In Nineteeth Asilomar Conference on Circuits, Systems and Computers.
[44]
Raviraj S. Adve Pinyuen Chen, Michael C. Wicks. 2001. Development of a statistical procedure for detecting the number of signals in a radar measurement. IEEE Proceedings - Radar, Sonar and Navigation (2001).
[45]
Irving S. Reed, J. D. Mallett, and Lawrence E. Brennan. 1974. Rapid convergence rate in adaptive arrays. IEEETransAeroElec AES-10 (1974).
[46]
Peter Rindal. [n.d.]. The ABY3 Framework for Machine Learning and Database Operations. https://github.com/ladnir/aby3.
[47]
Peter Rindal and Mike Rosulek. 2016. Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution. Cryptology ePrint Archive, Report 2016/632. https://eprint.iacr.org/2016/632.
[48]
Ralph Schmidt. 1986. Multiple emitter location and signal parameter estimation. (1986). https://ieeexplore.ieee.org/abstract/document/1143830
[49]
sharemind.cyber.ee. 2021. Sharemind. https://sharemind.cyber.ee/sharemind-mpc/ Retrieved 3-20-2021.
[50]
wsj.com Thomas Braun. 2020. Miniature Menace: The Threat of Weaponized Drone Use by Violent Non-state Actors. https://www.airuniversity.af.edu/Wild-Blue-Yonder/Article-Display/Article/2344151/miniature-menace-the-threat-of-weaponized-drone-use-by-violent-non-state-actors/
[51]
rferl.org Tony Wesolowsky. 2017. Ukraine's Exploding Munition Depots Give Ammunition To Security Concerns. https://www.rferl.org/a/ukraine-exploding-munitions-security-concerns-russia/28777991.html
[52]
US Federal Aviation Administration (FAA). 2021. UAS Remote Identification Overview. https://www.faa.gov/uas/getting_started/remote_id/ Retrieved 3-20-2021.
[53]
Marinos Vomvas. 2021. Issue No.: 181, 177, 124, 126, 120, 81, 85, 86, 87. https://github.com/data61/MP-SPDZ/issues/.
[54]
Marinos Vomvas. 2021. Source Code. https://github.com/Vomvas/Selest.git.
[55]
Jun Wang, Feng gang Yan, Shuai Liu, and Xiao lin Qiao. 2015. Compressive sensing DOA estimation for active radar in forward-looking direction. IET Conference Proceedings (2015).
[56]
Xiao Wang, Alex J. Malozemoff, and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https://github.com/emp-toolkit.
[57]
Xiao Wang, Samuel Ranellucci, and Jonathan Katz. 2017. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation. Cryptology ePrint Archive, Report 2017/030. https://eprint.iacr.org/2017/030.
[58]
Mati Wax and Thomas Kailath. 1985. Detection of signals by information theoretic criteria. IEEE Transactions on Acoustics, Speech, and Signal Processing (1985).
[59]
Emma White. 2021. Low-latency computing with AWS Local Zones. https://aws.amazon.com/blogs/compute/low-latency-computing-with-aws-local-zones-part-1/ Retrieved 3-20-2021.
[60]
Lingyun X. Xiaofei Z., Jianfeng L. 2011. Novel two-dimensional DOA estimation with L-shaped array. EURASIP J. Adv. Signal Process. (2011).
[61]
X.Zhang, X.Gao, and W.Chen. 2009. Improved Blind 2 D - Direction of Arrival Estimation with L - Shaped Array Using Shift Invariance Property. Journal of Electromagnetic Waves and Applications (2009).
[62]
Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS '86).
[63]
Samee Zahur and David Evans. 2015. Obliv-C: A Language for Extensible Data-Oblivious Computation. Cryptology ePrint Archive, Report 2015/1153. https://eprint.iacr.org/2015/1153.
[64]
Michael D. Zoltowski, Martin Haardt, and Cherian P. Mathews. 1996. Closed-form 2-D angle estimation with rectangular arrays in element space or beamspace via unitary ESPRIT. IEEE Transactions on Signal Processing (1996).

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks
June 2021
412 pages
ISBN:9781450383493
DOI:10.1145/3448300
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 June 2021

Permissions

Request permissions for this article.

Check for updates

Badges

Author Tags

  1. DoA estimation
  2. multiparty computation
  3. private drone localization

Qualifiers

  • Research-article

Funding Sources

Conference

WiSec '21
Sponsor:

Acceptance Rates

WiSec '21 Paper Acceptance Rate 34 of 121 submissions, 28%;
Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 285
    Total Downloads
  • Downloads (Last 12 months)84
  • Downloads (Last 6 weeks)12
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media