Abstract
In Wireless Sensor Network (WSN) the wireless communication is an open access communication. Eavesdropping is a common but severe security threat and it is the root cause of many attacks. This can be eliminated/prevented by providing physical (PHY) layer security by obfuscating the radio frequency (RF) signal radiated from antenna. This level of security can be achieved either at modulation or spread spectrum block being used at PHY layer. Modulation obfuscation requires complex hardware architecture; hence we have explored Spread Spectrum which needs a secret spreading sequence per node. This method provides security by indirectly not allowing an unknown user to synchronize to the communication. The security strength depends on the length of spreading sequence. As per the WSN PHY standard this approach cannot be implemented directly, since every node requires 16 different spreading sequences, which is practically not feasible. To resolve this, we have proposed two ways in this paper; single secret spreading sequence per node and Index Alteration based chipping sequence mapping for existing PHY layer. To strengthen the security, secret preamble with secret spreading sequence has also been explored. This paper also describes about the design of Novel PHY block. This block facilitates the dynamic change of spreading and preamble sequence. Proposed PHY security techniques have been implemented and tested using this block.
Similar content being viewed by others
References
Gollakota, S., & Katabi, D. (2011). Physical layer wireless security made fast and channel independent. In Proceedings IEEE infocom (pp. 1125–1133). Shanghai, 2011.
Rabbachin, A., Conti, A., & Win, M. Z. (2011). Intentional network interference for denial of wireless eavesdropping. In IEEE global telecommunications conference—GLOBECOM 2011 (pp. 1–6), Houston, TX, USA, 2011.
Chacko, J., & et al. (2017). Physical gate based preamble obfuscation for securing wireless communication. In International conference on computing, networking and communications (ICNC) (pp. 293–297). Santa Clara, CA, 2017. https://doi.org/10.1109/iccnc.2017.7876142.
Rahbari, H., & Krunz, M. (2016). Full frame encryption and modulation obfuscation using channel-independent preamble identifier. IEEE Transactions on Information Forensics and Security, 11(12), 2732–2747.
Muntwyler, B., Lenders, V., Legendre, F., & Plattner, B. (2012). Obfuscating IEEE 802.15.4 communication using secret spreading codes. In 9th Annual conference on wireless on-demand network systems and services (WONS) (pp. 1–8). Courmayeur, 2012. https://doi.org/10.1109/wons.2012.6152228.
Li, T., Ren, J., Ling, Q., & Jain, A. (2005). Physical layer built-in security analysis and enhancement of CDMA systems. In MILCOM 2005—2005 IEEE military communications conference (pp. 956–962, Vol. 2). Atlantic City, NJ, 2005. https://doi.org/10.1109/milcom.2005.1605803.
Intercepting GSM traffic. Washington D.C., Feb 2008, Black Hat Briefing.
Kang, T., Li, X., Yu, C., & Kim, J. (2013). A survey of security mechanisms with direct sequence spread spectrum signals. Journal of Computer Science and Engineering, 7(3), 187–197.
Gaudenzi, R. D., Giannetti, F., & Luise, M. (1998). Signal synchronization for direct-sequence code-division multiple access radio modems. European Transactions on Telecommunications, 9(1), 73–89.
Li, X., Yu, C., Hizlan, M., Kim, W. T., & Park, S. (2013). Physical layer watermarking of direct sequence spread spectrum signals. In MILCOM 2013—2013 IEEE military communications conference (pp. 476–481). San Diego, CA, 2013.
Soderi, S., Mucchi, L., Hämäläinen, M., Piva, A., & Iinatti, J. (2016). Watermark-based secure communications in safety-related scenarios. In 10th international symposium on medical information and communication technology (ISMICT) (pp. 1–5). Worcester, MA, 2016.
Wang, Q. (2017). Using secret spreading codes to enhance physical layer security in wireless communication. In 2017 IEEE international conference on communications workshops (ICC workshops) (pp. 447–450). Paris, 2017.
Poisel, R. A. (2004). Modern communications jamming principles and techniques. Norwood: Artech House Publishers.
Adamy, D. L. (2004). EW 102: A second course in electronic warfare. Norwood: Artech House.
IEEE Computer Society. (2006). IEEE Standard 802.15.4–2006: Wireless medium access control and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs), September 2006. http://www.ieee802.org/11/.
Choong, L. (2009). Multi-channel IEEE 802.15.4 packet capture using software defined radio. In UCLA.
Goodspeed, T., Bratus, S., Melgares, R., Speers, R., & Smith, S. W. (2012). Api-do: Tools for exploring the wireless attack surface in smart meters. In 45th Hawaii international conference on system sciences (pp. 2133–2140). Maui, HI, 2012. https://doi.org/10.1109/hicss.2012.115.
Truong, N. B., & Yu, C. (2013). Investigating latency in GNU software radio with USRP embedded series SDR platform. In eighth international conference on broadband and wireless computing, communication and applications (pp. 9–14). Compiegne, 2013.
Wilhelm, M., Martinovic, I., Schmitt, J., & Lenders, V. (2011). Reactive jamming in wireless networks: How realistic is the threat. In Proceedings of ACM conference on wireless network security (WiSec).
Teubner, J., & Woods, L. (2009). Data processing on FPGAs. Morgan Claypool Publishers & PVLDB, 2(1), 910–921.
Page, K. J., Pappas, A., & Westra, J. (2007). Preamble design and analysis for channels with significant Doppler variation. In MILCOM 2007—IEEE military communications conference (pp. 1–7). Orlando, FL, USA, 2007.
Lanzisera, S., & Pister, K. S. J. (2007). Theoretical and practical limits to sensitivity in IEEE 802.15.4 receivers. In ICECS.
Eric Blossom et al. GNU radio. http://www.gnu.org/software/gnuradio/.
Hou, T. C., & Li, V. (1986). Transmission range control in multihop packet radio networks. IEEE Transactions on Communication, 34(1), 38–44.
Monks, J. P., Bharghavan, V., & Hwu, W.-M. W. (2001). A power controlled multiple access protocol for wireless packet networks. In IEEE infocom. April 2001.
Wu, S.-L., Tseng, Y.-C., & Sheu, J.-P. (2000). Intelligent medium access for mobile ad hoc networks with busy tones and power control. IEEE Journal on Selected Areas in Communications, 18(9), 1647–1657.
Son, D., Krishnamachari, B., & Heidemann, J. (2004). Experimental study of the effects of transmission power control and blacklisting in wireless sensor networks. In Proceedings of the IEEE conference on sensor and ad hoc communication and networks, (pp. 289–298). Santa Clara, CA, October 2004.
Schmid, T. (2005). GNU radio 802.15. 4 en- and decoding. Technical report TR-UCLA-NESL-200609-06, UCLA NESL. September 2006.
USRP B200 and B210—Ettus Research. https://www.ettus.com/content/files/b200-b210_spec_sheet.pdf.
Lindholm, J. H. (1968). An analysis of the pseudo-randomness properties of the sub sequences of longm-sequences. IEEE Transactions on Information Theory IT, 14, 569–576.
Ziani, A., & Medouri, A. (2012). Analysis of different pseudo-random and orthogonal spreading sequences in DS-CDMA. In International conference on multimedia computing and systems (pp. 558–564). Tangier, 2012.
Mitra, A. (2008). On pseudo-random and orthogonal binary spreading sequences. International Journal of Information and Communication Engineering, 4(2), 137–144.
Farahani, S. (2008). ZigBee wireless networks and transceivers. Burlington: Newnes Publications.
AT86RF233 Datasheet—Microchip Technology. www.microchip.com/downloads/en/…/atmel-8351-mcu_wirelessat86rf233_datasheet.pd.
Daiya, V., Krishnan, T. S. S., Ebenezer, J., Madhusoodanan, K., SatyaMurty, S. A. V., & Rao, B. (2016). Dynamic architecture for wireless sensor network-implementation & analysis. In International conference on wireless communications, signal processing and networking (WiSPNET) (pp. 1206–1211). Chennai, 2016.
Kobo, H. I., Abu-Mahfouz, A. M., & Hancke, G. P. (2017). A survey on software-defined wireless sensor networks: Challenges and design requirements. IEEE Access, 5, 1872–1899. https://doi.org/10.1109/access.2017.2666200.
Modieginyane, K. M., Letswamotse, B. B., Malekian, R., & Abu-Mahfouz, A. M. (2018). Software defined wireless sensor networks application opportunities for efficient network management: A survey. Computers & Electrical Engineering, 66(2018), 274–287. https://doi.org/10.1016/j.compeleceng.2017.02.026. ISSN: 0045-7906.
Suciu, G., Vulpe, A., Martian, A., Halunga, S., & Vizireanu, D. N. (2016). Big data processing for renewable energy telemetry using a decentralized cloud M2M system. Wireless Personal Communications, 87(3), 1113–1128.
Akiyama, T., Matsuoka, M., Matsuda, K., Sakemi, Y., & Kojima, H. (2018). Secure and long-lived wireless sensor network for data center monitoring. In IEEE 42nd annual computer software and applications conference (COMPSAC) (pp. 559–564), Tokyo, 2018. https://doi.org/10.1109/compsac.2018.10295.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Daiya, V., Ebenezer, J. & Jehadeesan, R. Security Implementation in Wireless Sensor Network by RF Signal Obfuscation. Wireless Pers Commun 106, 805–827 (2019). https://doi.org/10.1007/s11277-019-06191-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06191-7