ABSTRACT
OFDM is a widely used modulation scheme. It transmits data over multiple subcarriers in parallel, which provides high resilience against frequency-dependent channel drops (fading) and achieves high throughput. Due to the proliferation of OFDM-enabled devices and the increasing need for location information, the research community has suggested using OFDM symbols for secure (time-of-flight) distance measurements. However, a consequence of relying on multiple subcarriers is long symbols (time-wise). This makes OFDM systems not a natural fit for secure ranging, as long symbols allow an attacker longer observation and reaction times to mount a so-called early-detect/late-commit attack. Despite these concerns, a recent standardization effort (IEEE 802.11az [5]) envisions the use of OFDM-based signals for secure ranging. This paper lays the groundwork for analyzing OFDM time-of-flight measurements and studies the security guarantees of OFDM-based ranging against a physical-layer attacker. We use BPSK and 4-QAM, the most robust configurations, as examples to present a strategy that increases the chances for early-detecting the transmitted symbols. Our theoretical analysis and simulations show that such OFDM systems are vulnerable to early-detection/late-commit attacks, irrespective of frame length and number of subcarriers. We identify the underlying causes and explore a possible countermeasure, consisting of orthogonal noise and randomized phase.
- [n.d.]. 3db Access AG - Proximity based access control. https://www.3db-access.com/. [Online; Accessed March 25th 2021].Google Scholar
- [n.d.]. DW1000 Radio IC - Decawave. https://www.decawave.com/product/dw1000-radio-ic/. [Online; Accessed March 25th 2021].Google Scholar
- Task Group 4z. [n.d.]. IEEE 802.15 WPAN ”Enhanced Impulse Radio”. http://www.ieee802.org/15/pub/TG4z.html. [Online; Accessed March 25th 2021].Google Scholar
- Gildas Avoine, Muhammed Ali Bingöl, Ioana Boureanu, Srdjan čapkun, Gerhard Hancke, Süleyman Kardaş, Chong Hee Kim, Cédric Lauradoux, Benjamin Martin, Jorge Munilla, Alberto Peinado, Kasper Bonne Rasmussen, Dave Singelée, Aslan Tchamkerten, Rolando Trujillo-Rasua, and Serge Vaudenay. 2018. Security of Distance-Bounding: A Survey. ACM Comput. Surv. 51, 5, Article 94 (Sept. 2018), 33 pages.Google Scholar
- Task Group az. [n.d.]. IEEE 802.11 ”Next Generation Positioning”. http://www.ieee802.org/11/Reports/tgaz_update.htm. [Online; Accessed 25. March 2021].Google Scholar
- Task Group az. [n.d.]. Versioning for PHY Security. https://mentor.ieee.org/802.11/dcn/20/11-20-1972-01-00az-versioning-of-phy-security.pptx. [Online; Accessed 25. March 2021].Google Scholar
- Daniel S. Berger, Francesco Gringoli, Nicolò Facchi, Ivan Martinovic, and Jens Schmitt. 2014. Gaining Insight on Friendly Jamming in a Real-World IEEE 802.11 Network. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks(Oxford, United Kingdom) (WiSec ’14). Association for Computing Machinery, New York, NY, USA, 105–116. https://doi.org/10.1145/2627393.2627403Google ScholarDigital Library
- Stefan Brands and David Chaum. 1993. Distance-bounding protocols. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 344–359.Google Scholar
- S. Čapkun, M. Čagalj, R. Rengaswamy, I. Tsigkogiannis, J. Hubaux, and M. Srivastava. 2008. Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels. IEEE Transactions on Dependable and Secure Computing 5, 4 (2008), 208–223. https://doi.org/10.1109/TDSC.2008.11Google ScholarDigital Library
- Bhaswati Deka, Ryan M. Gerdes, Ming Li, and Kevin Heaslip. 2015. Friendly Jamming for Secure Localization in Vehicular Transportation. In International Conference on Security and Privacy in Communication Networks, Jing Tian, Jiwu Jing, and Mudhakar Srivatsa (Eds.). Springer International Publishing, Cham, 212–221.Google Scholar
- Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, and Jean-Yves Le Boudec. 2010. Effectiveness of Distance-decreasing Attacks Against Impulse Radio Ranging. In Proceedings of the Third ACM Conference on Wireless Network Security (Hoboken, New Jersey, USA) (WiSec ’10). ACM, New York, NY, USA, 117–128. https://doi.org/10.1145/1741866.1741887Google ScholarDigital Library
- Stuart A Golden and Steve S Bateman. 2007. Sensor measurements for Wi-Fi location with emphasis on time-of-arrival ranging. IEEE Transactions on Mobile Computing 6, 10 (2007).Google ScholarDigital Library
- Azadeh Haghparast, Traian Abrudan, and Visa Koivunen. 2009. OFDM ranging in multipath channels using time reversal method. In 2009 IEEE 10th Workshop on Signal Processing Advances in Wireless Communications. 568–572. https://doi.org/10.1109/SPAWC.2009.5161849Google ScholarCross Ref
- J. Kim and J. P. Choi. 2016. Cancellation-Based Friendly Jamming for Physical Layer Security. In 2016 IEEE Global Communications Conference (GLOBECOM). 1–6. https://doi.org/10.1109/GLOCOM.2016.7841646Google ScholarDigital Library
- Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, and Sachin Katti. 2015. Spotfi: Decimeter level localization using wifi. In ACM SIGCOMM Computer Communication Review, Vol. 45. ACM, 269–282.Google ScholarDigital Library
- Tsit Yuen Lam and Ka Hin Leung. 2000. On vanishing sums of roots of unity. Journal of algebra 224, 1 (2000), 91–109.Google ScholarCross Ref
- Patrick Leu, Mridula Singh, Marc Roeschlin, Kenneth G. Paterson, and Srdjan Čapkun. 2020. Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement. In IEEE Symposium on Security and Privacy.Google Scholar
- Reem Melki, Hassan N. Noura, Mohammad M. Mansour, and Ali Chehab. 2019. A survey on OFDM physical layer security. Physical Communication 32 (2019), 1 – 30. https://doi.org/10.1016/j.phycom.2018.10.008Google ScholarDigital Library
- Andreas F Molisch. 2012. Wireless communications. Vol. 34. John Wiley & Sons.Google Scholar
- M. Poturalski, M. Flury, P. Papadimitratos, J. P. Hubaux, and J. Y. Le Boudec. 2011. Distance Bounding with IEEE 802.15.4a: Attacks and Countermeasures. IEEE Transactions on Wireless Communications 10, 4 (April 2011), 1334–1344. https://doi.org/10.1109/TWC.2011.020111.101219Google ScholarCross Ref
- Hanif Rahbari and Marwan Krunz. 2014. Friendly CryptoJam: A Mechanism for Securing Physical-Layer Attributes. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks(Oxford, United Kingdom) (WiSec ’14). Association for Computing Machinery, New York, NY, USA, 129–140. https://doi.org/10.1145/2627393.2627415Google ScholarDigital Library
- A. Ranganathan and S. Capkun. 2017. Are We Really Close? Verifying Proximity in Wireless Systems. IEEE Security Privacy 15, 3 (2017), 52–58.Google ScholarDigital Library
- C. Shahriar, M. La Pan, M. Lichtman, T. C. Clancy, R. McGwier, R. Tandon, S. Sodagari, and J. H. Reed. 2015. PHY-Layer Resiliency in OFDM Communications: A Tutorial. IEEE Communications Surveys Tutorials 17, 1 (Firstquarter 2015), 292–314. https://doi.org/10.1109/COMST.2014.2349883Google ScholarDigital Library
- Mridula Singh, Patrick Leu, and Srdjan Čapkun. 2019. UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks. In NDSS.Google Scholar
- Mridula Singh, Marc Röschlin, Aanjhan Ranganathan, and Srdjan Capkun. 2020. V-Range: Enabling Secure Ranging in 5G Wireless Networks. (2020).Google Scholar
- Nils Ole Tippenhauer, Heinrich Luecken, Marc Kuhn, and Srdjan Capkun. 2015. UWB rapid-bit-exchange system for distance bounding. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, 2.Google ScholarDigital Library
- N. O. Tippenhauer, L. Malisa, A. Ranganathan, and S. Capkun. 2013. On Limitations of Friendly Jamming for Confidentiality. In 2013 IEEE Symposium on Security and Privacy. 160–173. https://doi.org/10.1109/SP.2013.21Google ScholarDigital Library
- Deepak Vasisht, Swarun Kumar, and Dina Katabi. 2016. Decimeter-Level Localization with a Single WiFi Access Point.. In NSDI, Vol. 16. 165–178.Google Scholar
Index Terms
- Security of Multicarrier Time-of-Flight Ranging
Recommendations
Filter Bank Multicarrier Modulation Schemes for Visible Light Communication
AbstractFilter bank multicarrier (FBMC) modulation scheme has come out as a capable contender for next generation wireless systems. This paper proposes FBMC modulation schemes for visible light communication (VLC). These modulation schemes consist of ...
Chaos shift keying spread spectrum with multicarrier modulation for secure digital communication
ISCGAV'04: Proceedings of the 4th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial VisionCombining chaos shift keying (CSK) spread spectrum (SS) system with the multicarrier modulation (MCM) scheme, orthogonal frequency division multiplexing (OFDM), and wavelet-based OFDM is presented in this paper. A chaotic sequence for chaos shift keying ...
Multicarrier modulation with variable peak‐to‐average power ratio using partial fast Fourier transform
The authors present a novel frequency division multiplexing scheme which can generate a signal whose worst‐case peak‐to‐average power ratio (PAPR) is tunable by an input parameter; they call this scheme tunable PAPR frequency division multiplexing (TP‐...
Comments