Skip to main content
Log in

A SDR-based verification platform for 802.11 PHY layer security authentication

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

The WiFi security authentication mechanism combined with the PHY layer information has become a hot spot of WiFi security research. The PHY layer contains rich information such as wireless channel, device location, and signal quality. High performance WiFi verification that supports PHY layer programming has become an indispensable tool for WiFi security research. This paper designs and implements a verification platform TickSEC that supports the research of WiFi security authentication at the PHY layer. It supports real-time acquisition of PHY layer information, and offers the programmability within the PHY layer. We also give a case study of WiFi device identification using PHY layer information. Experimental results show that TickSEC can meet the needs of PHY layer WiFi authentication verification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13

Similar content being viewed by others

References

  1. Scikit-learn. http://scikit-learn.org (2007)

  2. Cyusb3acc-005 fmc interconnect board. http://www.cypress.com/documentation/development-kitsboards/cyusb3acc-005-fmc-interconnect-board-ez-usb-fx3-superspeed (2014)

  3. Cyusb3kit-003 superspeed explorer kit. http://www.cypress.com/documentation/development-kitsboards/cyusb3kit-003-ez-usb-fx3-superspeed-explorer-kit (2014)

  4. Ad9361. http://www.analog.com/en/products/rf-microwave/integrated-transceivers-transmitters-receivers/wideband-transceivers-ic/ad9361.html (2018)

  5. Xilinx kc705 evaluation board. http://www.xilinx.com/products/boards-and-kits/ek-k7-kc705-g.html (2018)

  6. Bagci, I.E., Roedig, U., Martinovic, I., Schulz, M., Hollick, M.: Using channel state information for tamper detection in the internet of things. In: Proceedings of the 31st Annual Computer Security Applications Conference. ACM, pp. 131–140 (2015)

  7. Blossom, E.: GNU Radio: tools for exploring the radio frequency spectrum. Linux journal 2004(122), 4 (2004)

    Google Scholar 

  8. Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. ACM, pp. 116–127 (2008)

  9. Faria, D.B., Cheriton, D.R.: Detecting identity-based attacks in wireless networks using signalprints. In: Proceedings of the 5th ACM Workshop on Wireless Security. ACM, pp. 43–52 (2006)

  10. Fortune, S.J., Gay, D.M., Kernighan, B.W., Landron, O., Valenzuela, R.A., Wright, M.H.: Wise design of indoor wireless systems: practical computation and optimization. IEEE Comput. Sci. Eng. 2(1), 58–68 (1995)

    Article  Google Scholar 

  11. Fuhrmann, D.R., Antonio, G.S.: Transmit beamforming for mimo radar systems using partial signal correlation. IEEE Transaerospelectronsyst 44(1), 1–16 (2008)

    Google Scholar 

  12. Han, S.H., Lee, J.H.: An overview of peak-to-average power ratio reduction techniques for multicarrier transmission. IEEE Wirel. Commun. 12(2), 56–65 (2005)

    Article  MathSciNet  Google Scholar 

  13. Huang, J., Albazrqaoe, W., Xing, G.: Blueid: a Practical System for Bluetooth Device Identification. In: INFOCOM, 2014 Proceedings IEEE. IEEE, pp. 2849–2857 (2014)

  14. Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. Mob. Comput. 9(3), 449–462 (2010)

    Article  Google Scholar 

  15. Joachims, T.: Text categorization with support vector machines: learning with many relevant features. In: European conference on machine learning. Springer, pp. 137–142 (1998)

  16. Kalamandeen, A., Scannell, A., de Lara, E., Sheth, A., Lamarca, A.: Ensemble: cooperative proximity-based authentication. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services. ACM, pp. 331–344 (2010)

  17. Khattab, A., Camp, J., Hunter, C., Murphy, P., Sabharwal, A., Knightly, E.W.: WARP: a flexible platform for clean-slate wireless medium access protocol design. ACM SIGMOBILE Mobile Computing and Communications Review 12(1), 56–58 (2008)

    Article  Google Scholar 

  18. Li, X.: A verification platform for WiFi physical layer security research. Master’s thesis, Peking University, Beijing (2017)

    Google Scholar 

  19. Liaw, A., Wiener, M., et al.: Classification and regression by randomforest. R news 2(3), 18–22 (2002)

    Google Scholar 

  20. Liu, F.J., Wang, X., Tang, H.: Robust physical layer authentication using inherent properties of channel impulse response. In: Military Communications Conference, 2011-MILCOM 2011. IEEE, pp. 538–542 (2011)

  21. Liu, F.J., Wang, X., Primak, S.L.: A two dimensional quantization algorithm for CIR-based physical layer authentication. In: 2013 IEEE International Conference on Communications (ICC). IEEE, pp. 4724–4728 (2013a)

  22. Liu, H., Wang, Y., Yang, J., Chen, Y.: Fast and practical secret key extraction by exploiting channel response. In: INFOCOM, 2013 Proceedings IEEE. IEEE, pp. 3048–3056 (2013b)

  23. Liu, H., Wang, Y., Liu, J., Yang, J., Chen, Y.: Practical user authentication leveraging channel state information (CSI). In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. ACM, pp. 389–400 (2014)

  24. Mao, Y., Zhang, Y., Zhong, S.: Stemming downlink leakage from training sequences in multi-user MIMO networks. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp. 1580–1590 (2016)

  25. Olive, D.J.: Linear regression analysis. Technometrics 45(4), 362–363 (2003)

    Article  Google Scholar 

  26. Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81–106 (1986)

    Google Scholar 

  27. Release, M.: The mathworks. Inc, Natick, Massachusetts, United States 488 (2013)

  28. Schmogrow, R., Nebendahl, B., Winter, M., Josten, A., Hillerkuss, D., Koenig, S., Meyer, J., Dreschmann, M., Huebner, M., Koos, C.: Error vector magnitude as a performance measure for advanced modulation formats. IEEE Photon. Technol. Lett. 24(1), 61–63 (2011)

    Article  Google Scholar 

  29. Van de Beek, J.J., Sandell, M., Borjesson, P.O.: Ml estimation of time and frequency offset in ofdm systems. IEEE Trans. Signal Process. 45(7), 1800–1805 (1997)

    Article  Google Scholar 

  30. Winterstein, F., Bayliss, S., Constantinides, G.A.: High-level synthesis of dynamic data structures: a case study using vivado hls. In: International Conference on Field-Programmable Technology, pp. 362–365 (2013)

  31. Wu, H., Wang, T., Yuan, Z., Peng, C., Li, Z., Tan, Z., Ding, B., Li, X., Li, Y., Liu, J., et al.: The tick programmable low-latency sdr system. In: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. ACM, pp. 101–113 (2017)

  32. Xi, W., Li, X., Qian, C., Han, J., Tang, S., Zhao, J., Zhao, K.: KEEP: Fast secret key extraction protocol for D2D communication. In: 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS). IEEE, pp. 350–359 (2014)

  33. Xiao, L., Greenstein, L., Mandayam, N., Trappe, W.: Fingerprints in the ether: using the physical layer for wireless authentication. In: IEEE International Conference on Communications. IEEE, pp. 4646–4651 (2007)

  34. Xiao, L., Reznik, A., Trappe, W., Ye, C., Shah, Y., Greenstein, L., Mandayam, N.: PHY-authentication protocol for spoofing detection in wireless networks. In: Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. IEEE, pp. 1–6 (2010)

  35. Xiong, J., Jamieson, K.: Securearray: improving wifi security with fine-grained physical-layer information. In: Proceedings of the 19th Annual International Conference on Mobile Computing and Networking. ACM, pp. 441–452 (2013)

  36. Yang, J., Chen, Y., Trappe, W., Cheng, J.: Detection and localization of multiple spoofing attackers in wireless networks. IEEE Trans. Parallel Distrib. Syst. 24(1), 44–58 (2013)

    Article  Google Scholar 

  37. Zeng, K., Govindan, K., Mohapatra, P.: Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks]. IEEE Wirel. Commun. 17(5), 56–62 (2010)

    Article  Google Scholar 

  38. Zhang, M.L., Zhou, Z.H.: Ml-knn: a lazy learning approach to multi-label learning. Pattern Recogn. 40(7), 2038–2048 (2007)

    Article  Google Scholar 

Download references

Acknowledgements

The work is funded by National Key Research and Development Plan of China (2017YFB0801702) and key research project of National Natural Science Foundation (No. 61531004).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jun Liu or Tao Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Special Issue on Security and Privacy in Network Computing

Guest Editors: Xiaohong Jiang, Yongzhi Wang, Tarik Taleb, and Hua Wang

NaNA 2018 conference’s recommendation paper

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, X., Liu, J., Ding, B. et al. A SDR-based verification platform for 802.11 PHY layer security authentication. World Wide Web 23, 1011–1034 (2020). https://doi.org/10.1007/s11280-018-0654-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-018-0654-2

Keywords

Navigation