ABSTRACT
Drones are increasingly associated with incidents disturbing air traffic at airports, invading privacy, and even terrorism. Wireless Direction of Arrival (DoA) techniques, such as the MUSIC algorithm, can localize drones, but deploying a system that systematically localizes RF emissions can lead to intentional or unintentional (e.g., if compromised) abuse. Multi-Party Computation (MPC) provides a solution for controlled computation of the elevation of RF emissions, only revealing estimates when some conditions are met, such as when the elevation exceeds a specified threshold. However, we show that a straightforward implementation of MUSIC, which relies on costly computation of complex matrix operations such as eigendecomposition, in state of the art MPC frameworks is extremely inefficient requiring over 20 seconds to achieve the weakest security guarantees. In this work, we develop a set of MPC optimizations and extensions of MUSIC. We extensively evaluate our techniques in several MPC protocols achieving a speedup of 300-500 times depending on the security model and specific technique used. For instance a Malicious Shamir execution providing security against malicious adversaries enables 536 DoA estimations per second, making it practical for use in real-world setups.
- Chris Abbott, Matthew Clarke, Steve Hathorn, and Scott Hickie. 2016. Hostile Drones: The Hostile Use of Drones by Non-State Actors against British Targets. https://css.ethz.ch/en/services/digital-library/publications/publication.html/195685Google Scholar
- Elias Aboutanios, Aboulnasr Hassanien, Amr El-Keyi, Youssef Nasser, and Sergiy A. Vorobyov. 2017. Advances in DOA Estimation and Source Localization. International Journal of Antennas and Propagation (2017).Google Scholar
- EU Aviation Safety Agency. 2021. Civil drones regulations. https://www.easa.europa.eu/domains/civil-drones-rpas Retrieved 3-20-2021.Google Scholar
- aws.amazon.com. 2021. Amazon EC2 On-Demand Pricing. https://aws.amazon.com/ec2/pricing/on-demand/ Retrieved 3-20-2021.Google Scholar
- aws.amazon.com. 2021. Announcing improved networking performance for Amazon EC2 instances. https://aws.amazon.com/about-aws/whats-new/2017/09/announcing-improved-networking-performance-for-amazon-ec2-instances/ Retrieved 3-20-2021.Google Scholar
- Ettus Knowledge Base. 2016. GPSDO Selection Guide --- Ettus Knowledge Base,. http://kb.ettus.com/GPSDO_Selection_GuideGoogle Scholar
- Ettus Knowledge Base. 2020. OctoClock CDA-2990 --- Ettus Knowledge Base,. https://kb.ettus.com/OctoClock_CDA-2990 Retrieved 3-20-2021.Google Scholar
- Aniqua Baset, Christopher Becker, Kurt Derr, Samuel Ramirez, Sneha Kumar Kasera, and Aditya Bhaskara. 2019. Towards Wireless Environment Cognizance Through Incremental Learning. In 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).Google Scholar
- Donald Beaver. 1991. Efficient Multiparty Protocols Using Circuit Randomization. In Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '91).Google ScholarDigital Library
- Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing (STOC '88).Google ScholarDigital Library
- Lennart Braun, Daniel Demmler, Thomas Schneider, and Oleksandr Tkachenko. 2020. MOTION - A Framework for Mixed-Protocol Multi-Party Computation. Cryptology ePrint Archive, Report 2020/1137. https://eprint.iacr.org/2020/1137.Google Scholar
- Ran Canetti. 2000. Security and Composition of Multiparty Cryptographic Protocols. J. Cryptol. (2000).Google Scholar
- Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, and Ariel Nof. 2018. Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. In Advances in Cryptology - CRYPTO 2018.Google ScholarDigital Library
- Pei-Jung Chung, Mats Viberg, and Jia Yu. 2014. Chapter 14 - DOA Estimation Methods and Algorithms. In Academic Press Library in Signal Processing: Volume 3.Google Scholar
- M. P. Clark and L. L. Scharf. 1994. Two-dimensional modal analysis based on maximum likelihood. IEEE Transactions on Signal Processing (1994).Google Scholar
- Ivan Damgard, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, and Nigel P. Smart. 2012. Practical Covertly Secure MPC for Dishonest Majority - or: Breaking the SPDZ Limits. Cryptology ePrint Archive, Report 2012/642. https://eprint.iacr.org/2012/642.Google Scholar
- I. Damgard, V. Pastro, N.P. Smart, and S. Zakarias. 2011. Multiparty Computation from Somewhat Homomorphic Encryption. Cryptology ePrint Archive, Report 2011/535. https://eprint.iacr.org/2011/535.Google Scholar
- dji.com. 2021. DJI AEROSCOPE. https://www.dji.com/aeroscope Retrieved 3-20-2021.Google Scholar
- Daniel Escudero, Satrajit Ghosh, Marcel Keller, Rahul Rachuri, and Peter Scholl. 2020. Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits. Cryptology ePrint Archive, Report 2020/338. https://eprint.iacr.org/2020/338.Google Scholar
- faa.gov. 2021. B4UFLY Mobile App. https://www.faa.gov/uas/recreational_fliers/where_can_i_fly/b4ufly/ Retrieved 3-20-2021.Google Scholar
- J. E. Fernandez del Rio and M. F. Catedra-Perez. 1997. The matrix pencil method for two-dimensional direction of arrival estimation employing an L-shaped array. IEEE Transactions on Antennas and Propagation (1997).Google Scholar
- Eran Fishler and H. Vincent Poor. 2005. Estimation of the number of sources in unbalanced arrays via information theoretic criteria. IEEE Transactions on Signal Processing (2005).Google ScholarDigital Library
- foremtech.com. 2021. TrueView Radar. https://fortemtech.com/products/trueview-radar/ Retrieved 3-20-2021.Google Scholar
- J. G. F. Francis. 1961. The QR Transformation A Unitary Analogue to the LR Transformation---Part 1. Comput. J. (1961).Google Scholar
- Oded Goldreich. 2004. Foundations of Cryptography.Google Scholar
- Oded Goldreich, Silvio Micali, and Avi Wigderson. [n.d.]. A high-level approach to computer document formatting, In How to Play any Mental Game or a Completeness Theorem for Protocols with Honest Majority. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing.Google Scholar
- Nicholas J. Higham. 1992. Stability of a Method for Multiplying Complex Matrices with Three Real Matrix Multiplications. SIAM J. Matrix Anal. Appl. (1992).Google Scholar
- Yingbo Hua and Tapan K.Sarka. [n.d.]. ([n. d.]).Google Scholar
- wsj.com Jack Nicas. 2019. Criminals, Terrorists Find Uses for Drones, Raising Concerns. https://www.wsj.com/articles/criminals-terrorists-find-uses-for-drones-raising-concerns-1422494268Google Scholar
- wsj.com Joseph De Avila. 2019. New York Police Seek Authority to Take Down Drones. https://www.wsj.com/articles/new-york-police-seek-authority-to-take-down-drones-11550419320Google Scholar
- Marcel Keller. 2020. MP-SPDZ: A Versatile Framework for MultiParty Computation. Cryptology ePrint Archive, Report 2020/521. https://eprint.iacr.org/2020/521.Google Scholar
- Marcel Keller, Emmanuela Orsini, and Peter Scholl. 2016. MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). Association for Computing Machinery.Google ScholarDigital Library
- Marcel Keller, Valerio Pastro, and Dragos Rotaru. 2017. Overdrive: Making SPDZ Great Again. Cryptology ePrint Archive, Report 2017/1230. https://eprint.iacr.org/2017/1230.Google Scholar
- B. Knott, S. Venkataraman, A.Y. Hannun, S. Sengupta, M. Ibrahim, and L.J.P. van der Maaten. 2020. CrypTen: Secure Multi-Party Computation Meets Machine Learning. In Proceedings of the NeurIPS Workshop on Privacy-Preserving Machine Learning.Google Scholar
- Donald E. Knuth. 2014. Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd ed.).Google Scholar
- Markus Krueckemeier, Fabian Schwartau, Carsten Monka-Ewe, and Joerg Schoebel Technische. 2019. Synchronization of Multiple USRP SDRs for Coherent Receiver Applications. In 2019 Sixth International Conference on Software Defined Systems.Google Scholar
- V.N. Kublanovskaya. 1962. On some algorithms for the solution of the complete eigenvalue problem. U. S. S. R. Comput. Math. and Math. Phys. (1962).Google Scholar
- Andrei Lapets, Frederick Jansen, Kinan Dak Albab, Rawane Issa, Lucy Qin, Mayank Varia, and Azer Bestavros. 2018. Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS '18).Google ScholarDigital Library
- R. Levorato and E. Pagello. 2015. DOA Acoustic Source Localization in Mobile Robot Sensor Networks. In 2015 IEEE International Conference on Autonomous Robot Systems and Competitions.Google Scholar
- Yehuda Lindell. 2020. Secure Multiparty Computation. Commun. ACM (2020).Google Scholar
- Eleftheria Makri, Dragos Rotaru, Frederik Vercauteren, and Sameer Wagh. 2021. Rabbit: Efficient Comparison for Secure Multi-Party Computation. Cryptology ePrint Archive, Report 2021/119. https://eprint.iacr.org/2021/119.Google Scholar
- BBC News. 2018. Gatwick Airport: Drones ground flights. https://www.bbc.com/news/uk-england-sussex-46623754Google Scholar
- Arogyaswami Paulraj, R. Roy, and Thomas Kailath. 1985. Estimation Of Signal Parameters Via Rotational Invariance Techniques- Esprit. In Nineteeth Asilomar Conference on Circuits, Systems and Computers.Google Scholar
- Raviraj S. Adve Pinyuen Chen, Michael C. Wicks. 2001. Development of a statistical procedure for detecting the number of signals in a radar measurement. IEEE Proceedings - Radar, Sonar and Navigation (2001).Google Scholar
- Irving S. Reed, J. D. Mallett, and Lawrence E. Brennan. 1974. Rapid convergence rate in adaptive arrays. IEEETransAeroElec AES-10 (1974).Google Scholar
- Peter Rindal. [n.d.]. The ABY3 Framework for Machine Learning and Database Operations. https://github.com/ladnir/aby3.Google Scholar
- Peter Rindal and Mike Rosulek. 2016. Faster Malicious 2-party Secure Computation with Online/Offline Dual Execution. Cryptology ePrint Archive, Report 2016/632. https://eprint.iacr.org/2016/632.Google Scholar
- Ralph Schmidt. 1986. Multiple emitter location and signal parameter estimation. (1986). https://ieeexplore.ieee.org/abstract/document/1143830Google Scholar
- sharemind.cyber.ee. 2021. Sharemind. https://sharemind.cyber.ee/sharemind-mpc/ Retrieved 3-20-2021.Google Scholar
- wsj.com Thomas Braun. 2020. Miniature Menace: The Threat of Weaponized Drone Use by Violent Non-state Actors. https://www.airuniversity.af.edu/Wild-Blue-Yonder/Article-Display/Article/2344151/miniature-menace-the-threat-of-weaponized-drone-use-by-violent-non-state-actors/Google Scholar
- rferl.org Tony Wesolowsky. 2017. Ukraine's Exploding Munition Depots Give Ammunition To Security Concerns. https://www.rferl.org/a/ukraine-exploding-munitions-security-concerns-russia/28777991.htmlGoogle Scholar
- US Federal Aviation Administration (FAA). 2021. UAS Remote Identification Overview. https://www.faa.gov/uas/getting_started/remote_id/ Retrieved 3-20-2021.Google Scholar
- Marinos Vomvas. 2021. Issue No.: 181, 177, 124, 126, 120, 81, 85, 86, 87. https://github.com/data61/MP-SPDZ/issues/.Google Scholar
- Marinos Vomvas. 2021. Source Code. https://github.com/Vomvas/Selest.git.Google Scholar
- Jun Wang, Feng gang Yan, Shuai Liu, and Xiao lin Qiao. 2015. Compressive sensing DOA estimation for active radar in forward-looking direction. IET Conference Proceedings (2015).Google ScholarCross Ref
- Xiao Wang, Alex J. Malozemoff, and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https://github.com/emp-toolkit.Google Scholar
- Xiao Wang, Samuel Ranellucci, and Jonathan Katz. 2017. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation. Cryptology ePrint Archive, Report 2017/030. https://eprint.iacr.org/2017/030.Google Scholar
- Mati Wax and Thomas Kailath. 1985. Detection of signals by information theoretic criteria. IEEE Transactions on Acoustics, Speech, and Signal Processing (1985).Google ScholarCross Ref
- Emma White. 2021. Low-latency computing with AWS Local Zones. https://aws.amazon.com/blogs/compute/low-latency-computing-with-aws-local-zones-part-1/ Retrieved 3-20-2021.Google Scholar
- Lingyun X. Xiaofei Z., Jianfeng L. 2011. Novel two-dimensional DOA estimation with L-shaped array. EURASIP J. Adv. Signal Process. (2011).Google Scholar
- X.Zhang, X.Gao, and W.Chen. 2009. Improved Blind 2 D - Direction of Arrival Estimation with L - Shaped Array Using Shift Invariance Property. Journal of Electromagnetic Waves and Applications (2009).Google Scholar
- Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS '86).Google ScholarDigital Library
- Samee Zahur and David Evans. 2015. Obliv-C: A Language for Extensible Data-Oblivious Computation. Cryptology ePrint Archive, Report 2015/1153. https://eprint.iacr.org/2015/1153.Google Scholar
- Michael D. Zoltowski, Martin Haardt, and Cherian P. Mathews. 1996. Closed-form 2-D angle estimation with rectangular arrays in element space or beamspace via unitary ESPRIT. IEEE Transactions on Signal Processing (1996).Google Scholar
Index Terms
- SELEST: secure elevation estimation of drones using MPC
Recommendations
A search-free DOA estimation algorithm for coprime arrays
Recently, coprime arrays have been in the focus of research because of their potential in exploiting redundancy in spanning large apertures with fewer elements than suggested by theory. A coprime array consists of two uniform linear subarrays with inter-...
Protocols for Multiparty Coin Toss with a Dishonest Majority
Coin-tossing protocols are protocols that generate a random bit with uniform distribution, although some corrupted parties might try to bias the output. These protocols are used as a building block in many cryptographic protocols. Cleve (Proc. of the ...
DOA estimation based on the difference and sum coarray for coprime arrays
In this paper, we construct a novel coarray named as the difference and sum (diffsum) coarray by exploiting an improved Conjugate Augmented MUSIC (CAM) estimator, which utilizes both the temporal information and the spatial information. The diffsum ...
Comments