Skip to main content
Log in

Physical Layer Encryption for Wireless OFDM Communication Systems

  • Published:
Journal of Hardware and Systems Security Aims and scope Submit manuscript

Abstract

Our everyday lives are impacted by the widespread adoption of wireless communication systems integral to residential, industrial, and commercial settings. Devices must be secure and reliable to support the emergence of large scale heterogeneous networks. Higher layer encryption techniques such as Wi-Fi Protected Access (WPA/WPA2) are vulnerable to threats, including even the latest WPA3 release. Physical layer security leverages existing components of the physical or PHY layer to provide a low-complexity solution appropriate for wireless devices. This work presents a PHY layer encryption technique based on frequency induction for Orthogonal Frequency Division Multiplexing (OFDM) signals to increase security against eavesdroppers. The secure transceiver consists of a key to frequency shift mapper, encryption module, and modified synchronizer for decryption. The system has been implemented on a Virtex-7 FPGA. The additional hardware overhead incurred on the Virtex-7 for both the transmitter and the receiver is low. Both simulation and hardware evaluation results demonstrate that the proposed system is capable of providing secure communication from an eavesdropper with no decrease in performance as compared with the baseline case of a standard OFDM transceiver. The techniques developed in this paper provide greater security to OFDM-based wireless communication systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. The maximum offset results from the sum of the fixed point value of each bit . For the 8-bit example described: 22 + 21 + 20 + 2− 1 + 2− 2 + 2− 3 + 2− 4 + 2− 5 = 7.96875.

References

  1. Fehér DJ, Sandor B (2018) Effects of the WPA2 KRACK attack in real environment. In: Proceedings of the IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY), pp 239–242

  2. Cimpanu C Dragonblood Vulnerabilities Disclosed in WiFi WPA3 Standard. https://www.zdnet.com/article/dragonblood-vulnerabilities-disclosed-in-wifi-wpa3-standard/

  3. Mukherjee A (2015) Physical-layer security in the Internet of Things: sensing and communication confidentiality under resource constraints. Proc IEEE 103(10):1747–1761

    Article  Google Scholar 

  4. Proakis JG, Salehi M (2007) Digital communications, 5th edn. McGraw-Hill, Boston Mass

    Google Scholar 

  5. Li YG (2009) Orthogonal frequency division multiplexing for wireless communications. Springer, Berlin

    Google Scholar 

  6. Wi-Fi Alliance, Discover Wi-Fi https://www.wi-fi.org/discover-wi-fi

  7. Jacovic M, Kraus M, Mainland G, Dandekar K (2019) Evaluation of physical layer secret key generation for IoT devices. In: Proceedings of the IEEE 20th Wireless and Microwave Technology Conference (WAMICON), pp 1–6

  8. Molisch A (2005) Wireless communications, 2nd edn. John Wiley & Sons Ltd, New York

    Google Scholar 

  9. Da-Shan Shiu G, Foschini J, Gans MJ, Kahn JM (2000) Fading correlation and its effect on the capacity of multielement antenna systems. IEEE Trans Commun 48(3):502–513

    Article  Google Scholar 

  10. Mathur S, Trappe W, Mandayam N, Ye C, Reznik A (2008) Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the ACM International Conference on Mobile Computing and Networking, pp 128–139

  11. Premnath SN, Jana S, Croft J, Gowda PL, Clark M, Kasera SK, Patwari N, Krishnamurthy SV (2013) Secret key extraction from wireless signal strength in real environments. IEEE Trans Mob Comput 12(5):917–930

    Article  Google Scholar 

  12. Chacko J, Juretus K, Jacovic M, Sahin C, Kandasamy N, Savidis I, Dandekar KR (2019) Securing wireless communication via hardware-based packet obfuscation. Journal of Hardware and Systems Security, [Online]. Available: https://doi.org/10.1007/s41635-019-00070-0

  13. IEEE Standard for Floating-Point Arithmetic, IEEE Std 754-2008, 1–70, 2008

  14. Schmidl TM, Cox DC (1997) Robust frequency and timing synchronization for OFDM. IEEE Trans Commun 45(12):1613–1621

    Article  Google Scholar 

  15. Minn H, Bhargava VK, Letaief KB (2003) A robust timing and frequency synchronization for OFDM, Systems. IEEE trans Wireless Commun 2(4):822–839

    Article  Google Scholar 

  16. IEEE Standard for Information Technology- Telecommunications and Information Exchange Between Systems- Local and Metropolitan Area Networks- Specific Requirements Part Ii: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11g-2003 (Amendment to IEEE Std 802.11, 1999 Edn. (Reaff 2003) as amended by IEEE Stds 802.11a-1999, 802.11b-1999, 802.11b-1999/Cor 1-2001, and 802.11d-2001), pp. i–67, 2003.

  17. Dandekar K, Begashaw S, Jacovic M, Lackpour A, Rasheed I, Rivas Rey X, Sahin C, Shaher S, Mainland G (2019) Grid software defined radio network testbed for hybrid measurement and emulation. In: Proceedings of the IEEE International Conference on Sensing, Communication, and Networking (SECON) (SECON 2019). USA, Boston

  18. de la Piedra A, Braeken A, Touhafi A (2012) Sensor systems based on FPGAs and their applications: a survey. Sensors (Basel, Switzerland) 12:12235–64, 12

    Article  Google Scholar 

  19. National Instruments, Ettus Research, https://www.ettus.com/

  20. Al-Sarawi S, Anbar M, Alieyan K, Alzubaidi M (2017) Internet of Things (IoT) communication protocols: review. In: Proceedings of the IEEE International Conference on Information Technology (ICIT), pp 685–690

  21. Li L, Xiaoguang H, Ke C, Ketai H (2011) The Applications of WiFi-based wireless sensor network in Internet of Things and Smart Grid. In: Proceedings of the IEEE Conference on Industrial Electronics and Applications, pp 789–793

  22. IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 11: Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) Specifications Amendment 5: Enhancements for Higher Throughput, IEEE Std 802.11n-2009 (Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, and IEEE Std 802.11w-2009), pp. 1–565, Oct 2009.

  23. Halperin D, Greenstein B, Sheth A, Wetherall D (2010) Demystifying 802.11n power consumption, In Proceedings of the 2010 International Conference on Power Aware Computing and Systems, ser. HotPower’10USA: USENIX Association, 1

  24. Li H, Wang X, Hou W (2013) Secure transmission in OFDM systems by using time domain scrambling. In: Proceedings of the IEEE 77th Vehicular Technology Conference (VTC Spring), pp 1–5

  25. Reilly D, Kanter GS (2009) Noise-enhanced encryption for physical layer security in an OFDM radio. In: Proceedings of the IEEE Radio and Wireless Symposium, pp 344–347

  26. Soltani M, Baykaş T, Arslan H (2015) Achieving secure communication through pilot manipulation. In: Personal Indoor, and Mobile Radio Communications (PIMRC,), 2015 IEEE 26th Annual International Symposium on, pp 527–531

  27. Umebayashi K, nakabayashi F, Suzuki Y (2014) A study on secure pilot signal design for OFDM systems. In: Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, pp 1–5

  28. Chacko J, Juretus K, Jacovic M, Sahin C, Kandasamy N, Savidis I, Dandekar K (2017) Physical gate based preamble obfuscation for securing wireless communication. In: Proceedings of the IEEE InternationalConference on Computing, Networking and Communications, pp 293–297

  29. Wheeler CG, Reising DR (2017) Assessment of the impact of CFO on RF - DNA fingerprint classification performance , pp 110–114

  30. Vo-Huu TD, Vo-Huu TD, Noubir G (2016) Fingerprinting Wi-Fi devices using software defined radios. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, ser. WiSec ’16. USA:ACM, pp 3–14

  31. Hou W, Wang X, Chouinard J, Refaey A (2014) Physical layer authentication for mobile systems with time-varying carrier frequency offsets. IEEE Trans Commun 62(5):1658–1667

    Article  Google Scholar 

  32. Kumar V, Park JM, Bian K (2014) Blind transmitter authentication for spectrum security and enforcement. In:Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ser. CCS ’14. USA:ACM [Online]. Available: https://doi.org/10.1145/2660267.2660318

Download references

Funding

This research was supported by the National Science Foundation Grant No. CNS-1816387, the Department of Education Graduate Assistance in Areas of National Need (GAANN) program under award P200A180082, and the Air Force Office of Scientific Research, National Defense Science and Engineering Graduate (NDSEG) Fellowship, 32 CFR 168a.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marko Jacovic.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Specific details regarding the coarse timing (Section A) and fine timing (Section A) implementation of the OFDM synchronizer described in Section 6.1 are provided.

1.1 A.1 Coarse Timing

The coarse timing component of the synchronizer utilizes the received signal samples to determine the coarse start time of the packet and the iterative calculation of the modified correlation given by (7). The outputs of the module are provided to the CFO estimation block. The real and imaginary components of (7) are given as

$$ \begin{array}{@{}rcl@{}} &&Re\{P[n+1]\} = Re\{P[n]\}+r^{I}[n+L]r^{I}[n+2L]-r^{I}[n]r^{I}[n+L] \\ &&- r^{Q}[n]r^{Q}[n+L]+r^{Q}[n+L]r^{Q}[n+2L],and \end{array} $$
(17)
$$ \begin{array}{@{}rcl@{}} &&Im\{P[n+1]\} = Im\{P[n]\}+r^{I}[n+L]r^{Q}[n+2L]\\ &&-r^{I}[n+2L]r^{Q}[n+L]-r^{I}[n]r^{Q}[n+L]+r^{I}[n+L]r^{Q}[n], \end{array} $$
(18)

respectively, where the superscript {⋅}I denotes the in-phase component of the received signal and {⋅}Q represents the quadrature phase. The real-valued calculation of the signal energy is derived as

$$ \begin{array}{@{}rcl@{}} R[n+1] &=& R[n]+|(r^{I}[n])^{2}+(r^{Q}[n])^{2}- \\ &&(r^{I}[n+2L])^{2}-(r^{Q}[n+2L])^{2}|^{2}. \end{array} $$
(19)

A filtered timing metric is calculated as

$$ M_{LPF}[n] = \frac{1}{C}\sum\limits_{k=0}^{C-1} \frac{|P^{I}[n-k]+P^{Q}[n-k]|^{2}}{|R[n-k]|^{2}}, $$
(20)

where the window is set to the cyclic prefix length C. The strength of P[n] varies and, therefore, requires normalization by R[n], with a result as given by MLPF[n], which is used to set a hard threshold. The coarse timing point is selected at the maximum of the MLPF[n] metric. The inputs to the implemented unmodified synchronizer are the real and imaginary signal samples each with data type S16_14 and a coarse timing comparison threshold of data type U16_0. The resulting threshold addresses a Block RAM, which allows for the setting of fractional values. The calculations of (17), (18), and (19) are performed in parallel to reduce latency, but require 12 multipliers to implement the complex operations. The timing metric given by (20) is calculated using a divider block after bit-shifting the auto-correlation values to meet input constraints, with the resulting output being of data type U16_14. Low pass filtering is implemented with parallel addressable shift registers, cascaded addition, and a constant multiplier. Relational operators are used for threshold crossing throughout the implementation of the synchronizer. The number of time samples above the timing metric threshold is calculated using a counter, with crossings determined by rise and fall edge detection. The output of the counter is used to address shift registers for proper signal alignment in time.

1.2 A.2 Fine Timing

Fine timing is completed using the output samples of the CFO correction block and a threshold value, with the output being the corrected samples and a corresponding alignment signal. Fine timing and determination of the correct CFO estimate are performed by calculating the cross-correlation given by

$$ F_{i}[n] = \underset{m}{\sum} \hat{x}_{i}[m+n] S^{*}[m], $$
(21)

where S[m] is the reference signal provided to the receiver. The separate real and imaginary components of the cross-correlation are given as

$$ Re\{F_{i}[n]\} = F_{i}^{II}[n]+F_{i}^{QQ}[n], \textrm{ and} $$
(22)
$$ Im\{F_{i}[n]\} = F_{i}^{QI}[n]-F_{i}^{IQ}[n], $$
(23)

respectively, where the superscript pair corresponds to the component of the corrected signal and the component of the reference signal used in individual cross-correlation calculations. The absolute value of the Fi signals are compared with a hard threshold to detect the start of the packet. Due to the structure of the preamble, there are ideally two events at which a crossing occurs, spaced by N samples. The first crossing corresponds to the start of the packet. The distance between multiple threshold events is used to filter incorrect estimates. The maximum values of F1 and F2 are compared to determine which CFO estimate is correct. The incorrectly adjusted signal results in a non-coherent correlation and yields low values.

The real and imaginary components of the CFO corrected signals each with data type S16_14 and the fine timing comparison threshold with data type U16_0 are provided as inputs to the implementation of the unmodified synchronizer on the FPGA. Multiplications are avoided by quantizing the signals to ± 1 and using conditional sign inversion with multiplexers. The reference signals are extracted using bit slices of data type U32_0 for decimal equivalent constants of the binary sequence. Cascaded addition is used to improve computational efficiency, and relational operators are used to compare the computed correlations with the hard threshold. The CFO corrected signals given by (10) are delayed to align with the calculated correlations to minimize loss in precision. The outputs of the unmodified synchronizer for packet alignment are the frequency corrected in-phase and quadrature phase samples with data type S16_14 and the corresponding timing pulses of data type U1_0 from the correlator.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jacovic, M., Juretus, K., Kandasamy, N. et al. Physical Layer Encryption for Wireless OFDM Communication Systems. J Hardw Syst Secur 4, 230–245 (2020). https://doi.org/10.1007/s41635-020-00097-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41635-020-00097-8

Keywords

Navigation