Abstract
Obfuscation of the orthogonal frequency-division multiplexing (OFDM) physical layer is described in this paper as a means to enhance the security of wireless communication. The standardization of the communication channel between two trusted parties results in a variety of security threats, including vulnerabilities in WPA/WPA2 protocols that allow for the extraction of the software layer encryption key. Obfuscating the physical layer of the OFDM pipeline provides an additional layer of security in the event that the software layer key is compromised and allows for rolling updates of the physical layer key without altering the software layer key. The interleaver stage of the OFDM pipeline is redesigned to utilize a physical layer key, which is termed Phy-Leave. The Phy-Leave interleaver is evaluated through both MATLAB simulation and hardware prototyping on the Software Defined Communication (SDC) testbed using a Virtex6 FPGA. The implemented rolling physical layer key policy and Phy-Leave system resulted in a less than 1% increase in the area of a Virtex6 FPGA, demonstrating physical layer obfuscation as a means to increase the security of wireless communication without a significant cost in hardware.
Similar content being viewed by others
References
Haykin S (1988) Digital communications. Wiley, New York
Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the ACM international conference on mobile computing and networking, pp 128–139
Sahin C, Katz B, Dandekar K (2016) Secure and robust symmetric key generation using physical layer techniques under various wireless environments. In: Proceedings of the IEEE radio and wireless symposium, pp 211–214
Katz BZ, Sahin C, Dandekar K (2016) Real-time wireless physical layer encryption. In: Proceedings of the IEEE annual wireless and microwave technology conference, pp 1–4
Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of RC4. In: Proceedings of the annual international workshop on selected areas in cryptography, pp 1–24
Wifi Pineapple, https://www.wifipineapple.com
Ahmad A, Biri A, Afifi H (2008) Study of a new physical layer encryption concept. In: Proceedings of the Ieee international conference on mobile Ad Hoc and sensor systems, pp 860–865
Ling Q, Li T, Ren J (2005) Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving. In: Proceedings of the IEEE global telecommunications conference, vol 3, pp 1–5
Lightfoot L, Zhang L, Ren J, Li T (2009) Secure collision-free frequency hopping for OFDMA-based wireless networks. EURASIP J Adv Signal Process 2009(1):361063
Khan MA, Jeoti V, Manzoor RS (2011) Secure interleaving-physical layer security enhancement of OFDM based system. e-Technologies and Networks for Development, pp 349– 361
Chacko J, Juretus K, Jacovic M, Sahin C, Kandasamy N, Savidis I, Dandekar K (2017) Physical gate based preamble obfuscation for securing wireless communication. In: Proceedings of the IEEE international conference on computing, networking and communications, pp 293–297
Shiu Y, Chang SY, Wu H, Huang SC, Chen H (2011) Physical layer security in wireless networks: a tutorial. IEEE Wirel Commun 18(2):66–74
Syverson P (1994) A taxonomy of replay attacks [cryptographic protocols]. In: Proceedings of the computer security foundations workshop, pp 187–191
Bysani LK, Turuk AK (2011) A survey on selective forwarding attack in wireless sensor networks. In: Proeedings of the IEEE international conference on devices and communications, pp 1–5
Zhu WT, Zhou J, Deng RH, Bao F (2012) Detecting node replication attacks in wireless sensor networks: a survey. J Netw Comput Appl 35(3):1022–1034
Khalil I, Bagchi S, Shroff NB (2005) LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Proceedings of the IEEE international conference on dependable systems and networks, pp 612–621
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the IEEE international workshop on sensor network protocols and applications, pp 113–127
Ali ST, Sivaraman V, Ostry D (2010) Secret key generation rate vs. reconciliation cost using wireless channel characteristics in body area networks. In: Proceedings of IEEE/IFIP international conference on embedded and ubiquitous computing, pp 644–650
MacLeod H, Loadman C, Chen Z (2005) Experimental studies of the 2.4-GHz ISM wireless indoor channel. In: Proceedings of the annual communication networks and services research conference, pp 63–68
Premnath SN, Jana S, Croft J, Gowda PL, Clark M, Kasera SK, Patwari N, Krishnamurthy SV (2013) Secret key extraction from wireless signal strength in real environments. IEEE Trans Mob Comput 12 (5):917–930
Massey J (1969) Shift-register synthesis and BCH decoding. IEEE Trans Inf Theory 15(1):122–127
Chacko J, Sahin C, Pfiel D, Kandasamy N, Dandekar K (2015) Rapid prototyping of wireless physical layer modules using flexible software/hardware design flow. In: Proceedings of the ACM/SIGDA international symposium on field-programmable gate arrays, pp 32–35
Chacko J, Sahin C, Nguyen D, Pfeil D, Kandasamy N, Dandekar K (2014) FPGA-based latency-insensitive OFDM pipeline for wireless research. In: Proceedings of the IEEE high performance extreme computing conference, pp 1–6
WARP Project, http://warpproject.org
ISO/IEC Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (Includes IEEE Std 802.11, 1999 Edition; IEEE Std 802.11A.-1999; IEEE Std 802.11B.-1999; IEEE Std 802.11B.-1999/Cor 1-2001; and IEEE Std 802.11D.-2001), ISO/IEC 8802-11 IEEE Std 802.11 Second edition 2005-08-01 ISO/IEC 8802 11:2005(E) IEEE Std 802.11i-2003 Edition, pp 1–721 (2005)
Erceg V, Schumacher L, Kyritsi P (2004) IEEE P802.11 wireless LANs: TGn channel model (IEEE 802.11-03/940r4)
Lin S, Costello DJ (2004) Error control coding, 2nd edn. Prentice-Hall, Inc., Upper Saddle River
Funding
This research was supported by the National Science Foundation Grant No. CNS-1228847, CNS-1730140, CNS-1816387, and DUE-1241631. Additional support was provided by DoD, Air Force Office of Scientific Research, National Defense Science and Engineering Graduate (NDSEG) Fellowships and 32 CFR 168a.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chacko, J., Juretus, K., Jacovic, M. et al. Securing Wireless Communication via Hardware-Based Packet Obfuscation. J Hardw Syst Secur 3, 261–272 (2019). https://doi.org/10.1007/s41635-019-00070-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-019-00070-0