Skip to main content
Log in

Securing Wireless Communication via Hardware-Based Packet Obfuscation

  • Published:
Journal of Hardware and Systems Security Aims and scope Submit manuscript

Abstract

Obfuscation of the orthogonal frequency-division multiplexing (OFDM) physical layer is described in this paper as a means to enhance the security of wireless communication. The standardization of the communication channel between two trusted parties results in a variety of security threats, including vulnerabilities in WPA/WPA2 protocols that allow for the extraction of the software layer encryption key. Obfuscating the physical layer of the OFDM pipeline provides an additional layer of security in the event that the software layer key is compromised and allows for rolling updates of the physical layer key without altering the software layer key. The interleaver stage of the OFDM pipeline is redesigned to utilize a physical layer key, which is termed Phy-Leave. The Phy-Leave interleaver is evaluated through both MATLAB simulation and hardware prototyping on the Software Defined Communication (SDC) testbed using a Virtex6 FPGA. The implemented rolling physical layer key policy and Phy-Leave system resulted in a less than 1% increase in the area of a Virtex6 FPGA, demonstrating physical layer obfuscation as a means to increase the security of wireless communication without a significant cost in hardware.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Haykin S (1988) Digital communications. Wiley, New York

    Google Scholar 

  2. Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the ACM international conference on mobile computing and networking, pp 128–139

  3. Sahin C, Katz B, Dandekar K (2016) Secure and robust symmetric key generation using physical layer techniques under various wireless environments. In: Proceedings of the IEEE radio and wireless symposium, pp 211–214

  4. Katz BZ, Sahin C, Dandekar K (2016) Real-time wireless physical layer encryption. In: Proceedings of the IEEE annual wireless and microwave technology conference, pp 1–4

  5. Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of RC4. In: Proceedings of the annual international workshop on selected areas in cryptography, pp 1–24

  6. Wifi Pineapple, https://www.wifipineapple.com

  7. Ahmad A, Biri A, Afifi H (2008) Study of a new physical layer encryption concept. In: Proceedings of the Ieee international conference on mobile Ad Hoc and sensor systems, pp 860–865

  8. Ling Q, Li T, Ren J (2005) Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving. In: Proceedings of the IEEE global telecommunications conference, vol 3, pp 1–5

  9. Lightfoot L, Zhang L, Ren J, Li T (2009) Secure collision-free frequency hopping for OFDMA-based wireless networks. EURASIP J Adv Signal Process 2009(1):361063

    Article  Google Scholar 

  10. Khan MA, Jeoti V, Manzoor RS (2011) Secure interleaving-physical layer security enhancement of OFDM based system. e-Technologies and Networks for Development, pp 349– 361

  11. Chacko J, Juretus K, Jacovic M, Sahin C, Kandasamy N, Savidis I, Dandekar K (2017) Physical gate based preamble obfuscation for securing wireless communication. In: Proceedings of the IEEE international conference on computing, networking and communications, pp 293–297

  12. Shiu Y, Chang SY, Wu H, Huang SC, Chen H (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun 18(2):66–74

    Article  Google Scholar 

  13. Syverson P (1994) A taxonomy of replay attacks [cryptographic protocols]. In: Proceedings of the computer security foundations workshop, pp 187–191

  14. Bysani LK, Turuk AK (2011) A survey on selective forwarding attack in wireless sensor networks. In: Proeedings of the IEEE international conference on devices and communications, pp 1–5

  15. Zhu WT, Zhou J, Deng RH, Bao F (2012) Detecting node replication attacks in wireless sensor networks: a survey. J Netw Comput Appl 35(3):1022–1034

    Article  Google Scholar 

  16. Khalil I, Bagchi S, Shroff NB (2005) LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Proceedings of the IEEE international conference on dependable systems and networks, pp 612–621

  17. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the IEEE international workshop on sensor network protocols and applications, pp 113–127

  18. Ali ST, Sivaraman V, Ostry D (2010) Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks. In: Proceedings of IEEE/IFIP international conference on embedded and ubiquitous computing, pp 644–650

  19. MacLeod H, Loadman C, Chen Z (2005) Experimental studies of the 2.4-GHz ISM wireless indoor channel. In: Proceedings of the annual communication networks and services research conference, pp 63–68

  20. Premnath SN, Jana S, Croft J, Gowda PL, Clark M, Kasera SK, Patwari N, Krishnamurthy SV (2013) Secret key extraction from wireless signal strength in real environments. IEEE Trans Mob Comput 12 (5):917–930

    Article  Google Scholar 

  21. Massey J (1969) Shift-register synthesis and BCH decoding. IEEE Trans Inf Theory 15(1):122–127

    Article  MathSciNet  MATH  Google Scholar 

  22. Chacko J, Sahin C, Pfiel D, Kandasamy N, Dandekar K (2015) Rapid prototyping of wireless physical layer modules using flexible software/hardware design flow. In: Proceedings of the ACM/SIGDA international symposium on field-programmable gate arrays, pp 32–35

  23. Chacko J, Sahin C, Nguyen D, Pfeil D, Kandasamy N, Dandekar K (2014) FPGA-based latency-insensitive OFDM pipeline for wireless research. In: Proceedings of the IEEE high performance extreme computing conference, pp 1–6

  24. WARP Project, http://warpproject.org

  25. ISO/IEC Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (Includes IEEE Std 802.11, 1999 Edition; IEEE Std 802.11A.-1999; IEEE Std 802.11B.-1999; IEEE Std 802.11B.-1999/Cor 1-2001; and IEEE Std 802.11D.-2001), ISO/IEC 8802-11 IEEE Std 802.11 Second edition 2005-08-01 ISO/IEC 8802 11:2005(E) IEEE Std 802.11i-2003 Edition, pp 1–721 (2005)

  26. Erceg V, Schumacher L, Kyritsi P (2004) IEEE P802.11 wireless LANs: TGn channel model (IEEE 802.11-03/940r4)

  27. Lin S, Costello DJ (2004) Error control coding, 2nd edn. Prentice-Hall, Inc., Upper Saddle River

    MATH  Google Scholar 

Download references

Funding

This research was supported by the National Science Foundation Grant No. CNS-1228847, CNS-1730140, CNS-1816387, and DUE-1241631. Additional support was provided by DoD, Air Force Office of Scientific Research, National Defense Science and Engineering Graduate (NDSEG) Fellowships and 32 CFR 168a.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyle Juretus.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chacko, J., Juretus, K., Jacovic, M. et al. Securing Wireless Communication via Hardware-Based Packet Obfuscation. J Hardw Syst Secur 3, 261–272 (2019). https://doi.org/10.1007/s41635-019-00070-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41635-019-00070-0

Keywords

Navigation