MIO: Enhancing Wireless Communications Security Through Physical Layer Multiple Inter-Symbol Obfuscation

Communications security is a critical and increasingly challenging issue in wireless networks. A well-known approach for achieving information-theoretic secrecy relies on deploying artificial noises to blind the intruders' interception in the physical layer. However, this approach requires a static channel condition for the transmitter and receiver to generate and offset the controllable artificial noise, which can hardly be implemented in real wireless environments. In this paper, we explore the feasibility of symbol obfuscation to defend against the passive eavesdropping attack and fake packet injection attack during the wireless communications. We propose a multiple inter-symbol obfuscation (MIO) scheme, which utilizes a set of artificial noisy symbols (symbols key) to obfuscate the original data symbols in the physical layer. MIO can effectively enhance the wireless communications security. On the one hand, an eavesdropper, without knowing the artificial noisy symbols, cannot correctly decrypt the obfuscated symbols from the eavesdropped packets. On the other hand, a legitimate receiver can easily check the integrity of the symbols key and then reject the fake packets from the received packets. The security analysis reveals that, without considering the initial key, the MIO scheme can achieve information-theoretic secrecy against the passive eavesdropping attack and computational secrecy against the fake packet injection attack. Moreover, we have implemented our approach in a USRP2 testbed and conducted simulations with Simulink tools to validate the effectiveness of MIO in enhancing wireless communications security.

[1]  Michael W. Hoffman,et al.  Fully programmable, scalable chaos-based PN sequence generation , 2000 .

[2]  Srikrishna Bhashyam,et al.  Multiuser channel estimation and tracking for long-code CDMA systems , 2002, IEEE Trans. Commun..

[3]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[4]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[5]  Steven M. Bellovin,et al.  Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  J.M. Gilbert,et al.  An integrated 802.11a baseband and MAC processor , 2002, 2002 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.02CH37315).

[7]  Gilles Van Assche,et al.  Quantum cryptography and secret-key distillation , 2006 .

[8]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[9]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[10]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[11]  Bijan G. Mobasseri,et al.  Digital modulation classification using constellation shape , 2000, Signal Process..

[12]  Hesham El Gamal,et al.  The Relay–Eavesdropper Channel: Cooperation for Secrecy , 2006, IEEE Transactions on Information Theory.

[13]  Steven M. Bellovin,et al.  Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.

[14]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[15]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[16]  Ezio Biglieri,et al.  Design of spread-spectrum sequences using chaotic dynamical systems and ergodic theory , 2001 .

[17]  H. Vincent Poor,et al.  Secure Nested Codes for Type II Wiretap Channels , 2007, 2007 IEEE Information Theory Workshop.

[18]  Mohammad Iftekhar Husain,et al.  CD-PHY: Physical layer security in wireless networks through constellation diversity , 2011, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[19]  Douglas R. Stinson Universal Hashing and Authentication Codes , 1991, CRYPTO.

[20]  B. Ramkumar,et al.  Automatic modulation classification for cognitive radios using cyclic feature detection , 2009, IEEE Circuits and Systems Magazine.

[21]  Dina Katabi,et al.  Physical layer wireless security made fast and channel independent , 2011, 2011 Proceedings IEEE INFOCOM.

[22]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[23]  Srdjan Capkun,et al.  Investigation of Signal and Message Manipulations on the Wireless Channel , 2011, ESORICS.

[24]  Dina Katabi,et al.  Zigzag decoding: combating hidden terminals in wireless networks , 2008, SIGCOMM '08.

[25]  Srihari Nelakuditi,et al.  CSMA/CN: Carrier Sense Multiple Access With Collision Notification , 2012, IEEE/ACM Transactions on Networking.

[26]  Jian Ren,et al.  Physical layer built-in security analysis and enhancement of CDMA systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[27]  Adam O'Neill,et al.  Correlated-Input Secure Hash Functions , 2011, TCC.

[28]  Hari Balakrishnan,et al.  PPR: partial packet recovery for wireless networks , 2007, SIGCOMM '07.

[29]  Paul G. Flikkema,et al.  Wireless physical-layer security via transmit precoding over dispersive channels: optimum linear eavesdropping , 2002, MILCOM 2002. Proceedings.

[30]  Petar Popovski,et al.  Shout to Secure: Physical-Layer Wireless Security with Known Interference , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[31]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[32]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[33]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[34]  Dong Chao,et al.  Universal Software Radio Peripheral , 2010 .