skip to main content
10.1145/3448300.3468228acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections

SELEST: secure elevation estimation of drones using MPC

Published:28 June 2021Publication History

ABSTRACT

Drones are increasingly associated with incidents disturbing air traffic at airports, invading privacy, and even terrorism. Wireless Direction of Arrival (DoA) techniques, such as the MUSIC algorithm, can localize drones, but deploying a system that systematically localizes RF emissions can lead to intentional or unintentional (e.g., if compromised) abuse. Multi-Party Computation (MPC) provides a solution for controlled computation of the elevation of RF emissions, only revealing estimates when some conditions are met, such as when the elevation exceeds a specified threshold. However, we show that a straightforward implementation of MUSIC, which relies on costly computation of complex matrix operations such as eigendecomposition, in state of the art MPC frameworks is extremely inefficient requiring over 20 seconds to achieve the weakest security guarantees. In this work, we develop a set of MPC optimizations and extensions of MUSIC. We extensively evaluate our techniques in several MPC protocols achieving a speedup of 300-500 times depending on the security model and specific technique used. For instance a Malicious Shamir execution providing security against malicious adversaries enables 536 DoA estimations per second, making it practical for use in real-world setups.

References

  1. Chris Abbott, Matthew Clarke, Steve Hathorn, and Scott Hickie. 2016. Hostile Drones: The Hostile Use of Drones by Non-State Actors against British Targets. https://css.ethz.ch/en/services/digital-library/publications/publication.html/195685Google ScholarGoogle Scholar
  2. Elias Aboutanios, Aboulnasr Hassanien, Amr El-Keyi, Youssef Nasser, and Sergiy A. Vorobyov. 2017. Advances in DOA Estimation and Source Localization. International Journal of Antennas and Propagation (2017).Google ScholarGoogle Scholar
  3. EU Aviation Safety Agency. 2021. Civil drones regulations. https://www.easa.europa.eu/domains/civil-drones-rpas Retrieved 3-20-2021.Google ScholarGoogle Scholar
  4. aws.amazon.com. 2021. Amazon EC2 On-Demand Pricing. https://aws.amazon.com/ec2/pricing/on-demand/ Retrieved 3-20-2021.Google ScholarGoogle Scholar
  5. aws.amazon.com. 2021. Announcing improved networking performance for Amazon EC2 instances. https://aws.amazon.com/about-aws/whats-new/2017/09/announcing-improved-networking-performance-for-amazon-ec2-instances/ Retrieved 3-20-2021.Google ScholarGoogle Scholar
  6. Ettus Knowledge Base. 2016. GPSDO Selection Guide --- Ettus Knowledge Base,. http://kb.ettus.com/GPSDO_Selection_GuideGoogle ScholarGoogle Scholar
  7. Ettus Knowledge Base. 2020. OctoClock CDA-2990 --- Ettus Knowledge Base,. https://kb.ettus.com/OctoClock_CDA-2990 Retrieved 3-20-2021.Google ScholarGoogle Scholar
  8. Aniqua Baset, Christopher Becker, Kurt Derr, Samuel Ramirez, Sneha Kumar Kasera, and Aditya Bhaskara. 2019. Towards Wireless Environment Cognizance Through Incremental Learning. In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).Google ScholarGoogle Scholar
  9. Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '91).Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88).Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lennart Braun, Daniel Demmler, Thomas Schneider, and Oleksandr Tkachenko. 2020. MOTION - A Framework for Mixed-Protocol Multi-Party Computation. Cryptology ePrint Archive, Report 2020/1137. https://eprint.iacr.org/2020/1137.Google ScholarGoogle Scholar
  12. Ran Canetti. 2000. Security and Composition of Multiparty Cryptographic Protocols. J. Cryptol. (2000).Google ScholarGoogle Scholar
  13. Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, and Ariel Nof. 2018. Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. In Advances in Cryptology - CRYPTO 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pei-Jung Chung, Mats Viberg, and Jia Yu. 2014. Chapter 14 - DOA Estimation Methods and Algorithms. In Academic Press Library in Signal Processing: Volume 3.Google ScholarGoogle Scholar
  15. M. P. Clark and L. L. Scharf. 1994. Two-dimensional modal analysis based on maximum likelihood. IEEE Transactions on Signal Processing (1994).Google ScholarGoogle Scholar
  16. Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, and Nigel P. Smart. 2012. Practical Covertly Secure MPC for Dishonest Majority - or: Breaking the SPDZ Limits. Cryptology ePrint Archive, Report 2012/642. https://eprint.iacr.org/2012/642.Google ScholarGoogle Scholar
  17. I. Damgard, V. Pastro, N.P. Smart, and S. Zakarias. 2011. Multiparty Computation from Somewhat Homomorphic Encryption. Cryptology ePrint Archive, Report 2011/535. https://eprint.iacr.org/2011/535.Google ScholarGoogle Scholar
  18. dji.com. 2021. DJI AEROSCOPE. https://www.dji.com/aeroscope Retrieved 3-20-2021.Google ScholarGoogle Scholar
  19. Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, and Peter Scholl. 2020. Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits. Cryptology ePrint Archive, Report 2020/338. https://eprint.iacr.org/2020/338.Google ScholarGoogle Scholar
  20. faa.gov. 2021. B4UFLY Mobile App. https://www.faa.gov/uas/recreational_fliers/where_can_i_fly/b4ufly/ Retrieved 3-20-2021.Google ScholarGoogle Scholar
  21. J. E. Fernandez del Rio and M. F. Catedra-Perez. 1997. The matrix pencil method for two-dimensional direction of arrival estimation employing an L-shaped array. IEEE Transactions on Antennas and Propagation (1997).Google ScholarGoogle Scholar
  22. Eran Fishler and H. Vincent Poor. 2005. Estimation of the number of sources in unbalanced arrays via information theoretic criteria. IEEE Transactions on Signal Processing (2005).Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. foremtech.com. 2021. TrueView Radar. https://fortemtech.com/products/trueview-radar/ Retrieved 3-20-2021.Google ScholarGoogle Scholar
  24. J. G. F. Francis. 1961. The QR Transformation A Unitary Analogue to the LR Transformation---Part 1. Comput. J. (1961).Google ScholarGoogle Scholar
  25. Oded Goldreich. 2004. Foundations of Cryptography.Google ScholarGoogle Scholar
  26. Oded Goldreich, Silvio Micali, and Avi Wigderson. [n.d.]. A high-level approach to computer document formatting, In How to Play any Mental Game or a Completeness Theorem for Protocols with Honest Majority. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing.Google ScholarGoogle Scholar
  27. Nicholas J. Higham. 1992. Stability of a Method for Multiplying Complex Matrices with Three Real Matrix Multiplications. SIAM J. Matrix Anal. Appl. (1992).Google ScholarGoogle Scholar
  28. Yingbo Hua and Tapan K.Sarka. [n.d.]. ([n. d.]).Google ScholarGoogle Scholar
  29. wsj.com Jack Nicas. 2019. Criminals, Terrorists Find Uses for Drones, Raising Concerns. https://www.wsj.com/articles/criminals-terrorists-find-uses-for-drones-raising-concerns-1422494268Google ScholarGoogle Scholar
  30. wsj.com Joseph De Avila. 2019. New York Police Seek Authority to Take Down Drones. https://www.wsj.com/articles/new-york-police-seek-authority-to-take-down-drones-11550419320Google ScholarGoogle Scholar
  31. Marcel Keller. 2020. MP-SPDZ: A Versatile Framework for MultiParty Computation. Cryptology ePrint Archive, Report 2020/521. https://eprint.iacr.org/2020/521.Google ScholarGoogle Scholar
  32. Marcel Keller, Emmanuela Orsini, and Peter Scholl. 2016. MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Marcel Keller, Valerio Pastro, and Dragos Rotaru. 2017. Overdrive: Making SPDZ Great Again. Cryptology ePrint Archive, Report 2017/1230. https://eprint.iacr.org/2017/1230.Google ScholarGoogle Scholar
  34. B. Knott, S. Venkataraman, A.Y. Hannun, S. Sengupta, M. Ibrahim, and L.J.P. van der Maaten. 2020. CrypTen: Secure Multi-Party Computation Meets Machine Learning. In Proceedings of the NeurIPS Workshop on Privacy-Preserving Machine Learning.Google ScholarGoogle Scholar
  35. Donald E. Knuth. 2014. Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd ed.).Google ScholarGoogle Scholar
  36. Markus Krueckemeier, Fabian Schwartau, Carsten Monka-Ewe, and Joerg Schoebel Technische. 2019. Synchronization of Multiple USRP SDRs for Coherent Receiver Applications. In 2019 Sixth International Conference on Software Defined Systems.Google ScholarGoogle Scholar
  37. V.N. Kublanovskaya. 1962. On some algorithms for the solution of the complete eigenvalue problem. U. S. S. R. Comput. Math. and Math. Phys. (1962).Google ScholarGoogle Scholar
  38. Andrei Lapets, Frederick Jansen, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, and Azer Bestavros. 2018. Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS '18).Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. R. Levorato and E. Pagello. 2015. DOA Acoustic Source Localization in Mobile Robot Sensor Networks. In 2015 IEEE International Conference on Autonomous Robot Systems and Competitions.Google ScholarGoogle Scholar
  40. Yehuda Lindell. 2020. Secure Multiparty Computation. Commun. ACM (2020).Google ScholarGoogle Scholar
  41. Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, and Sameer Wagh. 2021. Rabbit: Efficient Comparison for Secure Multi-Party Computation. Cryptology ePrint Archive, Report 2021/119. https://eprint.iacr.org/2021/119.Google ScholarGoogle Scholar
  42. BBC News. 2018. Gatwick Airport: Drones ground flights. https://www.bbc.com/news/uk-england-sussex-46623754Google ScholarGoogle Scholar
  43. Arogyaswami Paulraj, R. Roy, and Thomas Kailath. 1985. Estimation Of Signal Parameters Via Rotational Invariance Techniques- Esprit. In Nineteeth Asilomar Conference on Circuits, Systems and Computers.Google ScholarGoogle Scholar
  44. Raviraj S. Adve Pinyuen Chen, Michael C. Wicks. 2001. Development of a statistical procedure for detecting the number of signals in a radar measurement. IEEE Proceedings - Radar, Sonar and Navigation (2001).Google ScholarGoogle Scholar
  45. Irving S. Reed, J. D. Mallett, and Lawrence E. Brennan. 1974. Rapid convergence rate in adaptive arrays. IEEETransAeroElec AES-10 (1974).Google ScholarGoogle Scholar
  46. Peter Rindal. [n.d.]. The ABY3 Framework for Machine Learning and Database Operations. https://github.com/ladnir/aby3.Google ScholarGoogle Scholar
  47. Peter Rindal and Mike Rosulek. 2016. Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution. Cryptology ePrint Archive, Report 2016/632. https://eprint.iacr.org/2016/632.Google ScholarGoogle Scholar
  48. Ralph Schmidt. 1986. Multiple emitter location and signal parameter estimation. (1986). https://ieeexplore.ieee.org/abstract/document/1143830Google ScholarGoogle Scholar
  49. sharemind.cyber.ee. 2021. Sharemind. https://sharemind.cyber.ee/sharemind-mpc/ Retrieved 3-20-2021.Google ScholarGoogle Scholar
  50. wsj.com Thomas Braun. 2020. Miniature Menace: The Threat of Weaponized Drone Use by Violent Non-state Actors. https://www.airuniversity.af.edu/Wild-Blue-Yonder/Article-Display/Article/2344151/miniature-menace-the-threat-of-weaponized-drone-use-by-violent-non-state-actors/Google ScholarGoogle Scholar
  51. rferl.org Tony Wesolowsky. 2017. Ukraine's Exploding Munition Depots Give Ammunition To Security Concerns. https://www.rferl.org/a/ukraine-exploding-munitions-security-concerns-russia/28777991.htmlGoogle ScholarGoogle Scholar
  52. US Federal Aviation Administration (FAA). 2021. UAS Remote Identification Overview. https://www.faa.gov/uas/getting_started/remote_id/ Retrieved 3-20-2021.Google ScholarGoogle Scholar
  53. Marinos Vomvas. 2021. Issue No.: 181, 177, 124, 126, 120, 81, 85, 86, 87. https://github.com/data61/MP-SPDZ/issues/.Google ScholarGoogle Scholar
  54. Marinos Vomvas. 2021. Source Code. https://github.com/Vomvas/Selest.git.Google ScholarGoogle Scholar
  55. Jun Wang, Feng gang Yan, Shuai Liu, and Xiao lin Qiao. 2015. Compressive sensing DOA estimation for active radar in forward-looking direction. IET Conference Proceedings (2015).Google ScholarGoogle ScholarCross RefCross Ref
  56. Xiao Wang, Alex J. Malozemoff, and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https://github.com/emp-toolkit.Google ScholarGoogle Scholar
  57. Xiao Wang, Samuel Ranellucci, and Jonathan Katz. 2017. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation. Cryptology ePrint Archive, Report 2017/030. https://eprint.iacr.org/2017/030.Google ScholarGoogle Scholar
  58. Mati Wax and Thomas Kailath. 1985. Detection of signals by information theoretic criteria. IEEE Transactions on Acoustics, Speech, and Signal Processing (1985).Google ScholarGoogle ScholarCross RefCross Ref
  59. Emma White. 2021. Low-latency computing with AWS Local Zones. https://aws.amazon.com/blogs/compute/low-latency-computing-with-aws-local-zones-part-1/ Retrieved 3-20-2021.Google ScholarGoogle Scholar
  60. Lingyun X. Xiaofei Z., Jianfeng L. 2011. Novel two-dimensional DOA estimation with L-shaped array. EURASIP J. Adv. Signal Process. (2011).Google ScholarGoogle Scholar
  61. X.Zhang, X.Gao, and W.Chen. 2009. Improved Blind 2 D - Direction of Arrival Estimation with L - Shaped Array Using Shift Invariance Property. Journal of Electromagnetic Waves and Applications (2009).Google ScholarGoogle Scholar
  62. Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS '86).Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Samee Zahur and David Evans. 2015. Obliv-C: A Language for Extensible Data-Oblivious Computation. Cryptology ePrint Archive, Report 2015/1153. https://eprint.iacr.org/2015/1153.Google ScholarGoogle Scholar
  64. Michael D. Zoltowski, Martin Haardt, and Cherian P. Mathews. 1996. Closed-form 2-D angle estimation with rectangular arrays in element space or beamspace via unitary ESPRIT. IEEE Transactions on Signal Processing (1996).Google ScholarGoogle Scholar

Index Terms

  1. SELEST: secure elevation estimation of drones using MPC

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Article Metrics

          • Downloads (Last 12 months)75
          • Downloads (Last 6 weeks)11

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader