ABSTRACT
In recent works, numerous physical-layer security systems have been proposed as alternatives to classic cryptography. Such systems aim to use the intrinsic properties of radio signals and the wireless medium to provide confidentiality and authentication to wireless devices. However, fundamental vulnerabilities are often discovered in these systems shortly after their inception. We therefore challenge the assumptions made by existing physical-layer security systems, and postulate that weaker assumptions are needed in order to adapt for practical scenarios. We also argue that if no computational advantage over an adversary can be ensured, secure communication cannot be realistically achieved.
- O. R. Afolabi, K. Kim, and A. Ahmad. On secure spectrum sensing in cognitive radio networks using emitters electromagnetic signature. In Proceedings of 18th Internatonal Conference on Computer Communications and Networks, pages 1--5. IEEE, 2009. Google ScholarDigital Library
- N. Anand, S.-J. Lee, and E. W. Knightly. Strobe: Actively securing wireless communications using zero-forcing beamforming. In INFOCOM, pages 720--728. IEEE, 2012.Google ScholarCross Ref
- B. Danev, T. S. Heydt-Benjamin, and S. Capkun. Physical-layer Identification of RFID Devices. In Usenix Security Symposium, pages 199--214, 2009. Google ScholarDigital Library
- B. Danev, H. Luecken, S. Capkun, and K. El Defrawy. Attacks on physical-layer identification. In Proceedings of the third ACM conference on Wireless network security, pages 89--98. ACM, 2010. Google ScholarDigital Library
- B. Danev, D. Zanetti, and S. Capkun. On physical-layer identification of wireless devices. ACM Computing Surveys (CSUR), 45(1):6, 2012. Google ScholarDigital Library
- L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor. Cooperative jamming for wireless physical layer security. In IEEE/SP 15th Workshop on Statistical Signal Processing, pages 417--420. IEEE, 2009.Google Scholar
- S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: non-invasive security for implantable medical devices. ACM SIGCOMM Computer Communication Review, 41(4):2--13, 2011. Google ScholarDigital Library
- J. Hall, M. Barbeau, and E. Kranakis. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In Communications, Internet, and Information Technology, pages 201--206, 2004.Google Scholar
- B. W. Ramsey, T. D. Stubbs, B. E. Mullins, M. A. Temple, and M. A. Buckner. Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers. International Journal of Critical Infrastructure Protection, 8:27--39, 2015. Google ScholarDigital Library
- B. W. Ramsey, M. A. Temple, and B. E. Mullins. PHY foundation for multi-factor ZigBee node authentication. In Global Communications Conference (GLOBECOM), pages 795--800. IEEE, 2012.Google ScholarCross Ref
- K. B. Rasmussen and S. Capkun. Implications of radio fingerprinting on the security of sensor networks. In Third International Conference on Security and Privacy in Communications Networks, pages 331--340. IEEE, 2007.Google ScholarCross Ref
- S. U. Rehman, K. Sowerby, and C. Coghill. RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In Australian Communications Theory Workshop (AusCTW), pages 90--95. IEEE, 2012.Google ScholarCross Ref
- D. R. Reising, M. A. Temple, and M. J. Mendenhall. Improving intra-cellular security using air monitoring with RF fingerprints. In Wireless Communications and Networking Conference (WCNC), pages 1--6. IEEE, 2010.Google ScholarCross Ref
- M. Schulz, A. Loch, and M. Hollick. Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. In NDSS, 2014.Google ScholarCross Ref
- N. O. Tippenhauer, L. Malisa, A. Ranganathan, and S. Capkun. On limitations of friendly jamming for confidentiality. In IEEE Symposium on Security and Privacy (SP), pages 160--173. IEEE, 2013. Google ScholarDigital Library
- O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Canadian Journal of Electrical and Computer Engineering, 32(1):27--33, 2007.Google ScholarCross Ref
- Q. Wang, K. Xu, and K. Ren. Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE Journal on selected areas in communications, 30(9):1666--1674, 2012.Google ScholarCross Ref
- A. D. Wyner. The wire-tap channel. Bell Labs Technical Journal, 54(8):1355--1387, 1975.Google ScholarCross Ref
- A. Yener and S. Ulukus. Wireless physical-layer security: lessons learned from information theory. Proceedings of the IEEE, 103(10):1814--1825, 2015.Google ScholarCross Ref
- K. Zeng. Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine, 53(6):33--39, 2015.Google ScholarDigital Library
- Y. Zheng, M. Schulz, W. Lou, Y. T. Hou, and M. Hollick. Profiling the strength of physical-layer security: A study in orthogonal blinding. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pages 21--30. ACM, 2016. Google ScholarDigital Library
Index Terms
- PHY-layer security is no alternative to cryptography
Recommendations
Improved convertible authenticated encryption scheme with provable security
Convertible authenticated encryption (CAE) schemes allow a signer to produce an authenticated ciphertext such that only a designated recipient can decrypt it and verify the recovered signature. The conversion property further enables the designated ...
Nonmalleable Cryptography
The notion of nonmalleable cryptography, an extension of semantically secure cryptography, is defined. Informally, in the context of encryption the additional requirement is that given the ciphertext it is impossible to generate a different ciphertext ...
Security weaknesses of a signature scheme and authenticated key agreement protocols
At ACISP 2012, a novel deterministic identity-based (aggregate) signature scheme was proposed that does not rely on bilinear pairing. The scheme was formally proven to be existentially unforgeable under an adaptive chosen message and identity attack. ...
Comments