395 research outputs found

    Physical-Layer Security Enhancement in Wireless Communication Systems

    Get PDF
    Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of our lives. Despite of their popularities, wireless communications are vulnerable to various attacks due to the open nature of radio propagation. In fact, communication security in wireless networks is becoming more critical than ever. As a solution, conventional cryptographic techniques are deployed on upper layers of network protocols. Along with direct attacks from lower layer, wireless security challenges come with the rapid evolution of sophisticated decipher techniques. Conventional security mechanisms are not necessarily effective against potential attacks from the open wireless environment anymore. As an alternative, physical-layer(PHY) security, utilizing unique features from lower layer, becomes a new research focus for many wireless communication systems. In this thesis, three mechanisms for PHY security enhancement are investigated. Beginning with a discussion on the security vulnerability in highly standardized infrastructures, the thesis proposed a time domain scrambling scheme of orthogonal frequency division multiplexing (OFDM) system to improve the PHY security. The method relies on secretly scrambling each OFDM symbol in time domain, resulting in constellation transformation in frequency domain, to hide transmission features. As a complement to existing secrecy capacity maximization based optimal cooperative jamming systems, a security strategy based on the compromised secrecy region (CSR) minimization in cooperative jamming is then proposed when instantaneous channel state information(CSI) is not available. The optimal parameters of the jammer are derived to minimize the CSR which exhibits high secrecy outage probability. At last, security enhancement of OFDM system in cooperative networks is also investigated. The function selection strategies of cooperative nodes are studied. Our approach is capable of enhancing the security of broadband communications by selecting the proper function of each cooperative node. Numerical results demonstrate the feasibility of three proposed physical layer security mechanisms by examining the communication reliability, achievable CSR and secrecy capacity respectively

    Multifunction Radios and Interference Suppression for Enhanced Reliability and Security of Wireless Systems

    Get PDF
    Wireless connectivity, with its relative ease of over-the-air information sharing, is a key technological enabler that facilitates many of the essential applications, such as satellite navigation, cellular communication, and media broadcasting, that are nowadays taken for granted. However, that relative ease of over-the-air communications has significant drawbacks too. On one hand, the broadcast nature of wireless communications means that one receiver can receive the superposition of multiple transmitted signals. But on the other hand, it means that multiple receivers can receive the same transmitted signal. The former leads to congestion and concerns about reliability because of the limited nature of the electromagnetic spectrum and the vulnerability to interference. The latter means that wirelessly transmitted information is inherently insecure. This thesis aims to provide insights and means for improving physical layer reliability and security of wireless communications by, in a sense, combining the two aspects above through simultaneous and same frequency transmit and receive operation. This is so as to ultimately increase the safety of environments where wireless devices function or where malicious wirelessly operated devices (e.g., remote-controlled drones) potentially raise safety concerns. Specifically, two closely related research directions are pursued. Firstly, taking advantage of in-band full-duplex (IBFD) radio technology to benefit the reliability and security of wireless communications in the form of multifunction IBFD radios. Secondly, extending the self-interference cancellation (SIC) capabilities of IBFD radios to multiradio platforms to take advantage of these same concepts on a wider scale. Within the first research direction, a theoretical analysis framework is developed and then used to comprehensively study the benefits and drawbacks of simultaneously combining signals detection and jamming on the same frequency within a single platform. Also, a practical prototype capable of such operation is implemented and its performance analyzed based on actual measurements. The theoretical and experimental analysis altogether give a concrete understanding of the quantitative benefits of simultaneous same-frequency operations over carrying out the operations in an alternating manner. Simultaneously detecting and jamming signals specifically is shown to somewhat increase the effective range of a smart jammer compared to intermittent detection and jamming, increasing its reliability. Within the second research direction, two interference mitigation methods are proposed that extend the SIC capabilities from single platform IBFD radios to those not physically connected. Such separation brings additional challenges in modeling the interference compared to the SIC problem, which the proposed methods address. These methods then allow multiple radios to intentionally generate and use interference for controlling access to the electromagnetic spectrum. Practical measurement results demonstrate that this effectively allows the use of cooperative jamming to prevent unauthorized nodes from processing any signals of interest, while authorized nodes can use interference mitigation to still access the same signals. This in turn provides security at the physical layer of wireless communications

    Known-Interference Cancellation in Cooperative Jamming : Experimental Evaluation and Benchmark Algorithm Performance

    Get PDF
    Physical layer security is a sought-after concept to complement the established upper layer security techniques in wireless communications. An appealing approach to achieve physical layer security is to use cooperative jamming with interference that is known to and suppressible by the legitimate receiver but unknown to, and hence not suppressible by, the eavesdropper. Suppressing known interference (KI), however, is challenging due to the numerous unknowns, including carrier and sampling frequency offsets, that impact its reception. This letter presents a measurement campaign that captures this challenge and then demonstrates the feasibility of solving that challenge by cancelling the KI using the frequency offsets least mean squares (FO-LMS) algorithm. Results show that KI suppression directly improves processing the signal-of-interest and that cooperative jamming effectively provides security at the physical layer.Peer reviewe

    iJam: Jamming Oneself for Secure Wireless Communication

    Get PDF
    Wireless is inherently less secure than wired networks because of its broadcast nature. Attacks that simply snoop on the wireless medium successfully defeat the security of even 802.11 networks using the most recent security standards (WPA2-PSK). In this paper we ask the following question: Can we prevent this kind of eavesdropping from happening? If so, we can potentially defeat the entire class of attacks that rely on snooping. This paper presents iJam, a PHY-layer protocol for OFDM-based wireless systems. iJam ensures that an eavesdropper cannot successfully demodulate a wireless signal not intended for it. To achieve this iJam strategically introduces interference that prevents an eavesdropper from decoding the data, while allowing the intended receiver to decode it. iJam exploits the properties of 802.11â s OFDM signals to ensure that an eavesdropper cannot even tell which parts of the signal are jammed. We implement iJam and evaluate it in a testbed of GNURadios with an 802.11-like physical layer. We show that iJam makes the data bits at the adversary look random, i.e., the BER becomes close to 50%, whereas the receiver can perfectly decode the data

    Physical Layer Wireless Security Made Fast and Channel Independent

    Get PDF
    There is a growing interest in physical layer security. Recent work has demonstrated that wireless devices can generate a shared secret key by exploiting variations in their channel. The rate at which the secret bits are generated, however, depends heavily on how fast the channel changes. As a result, existing schemes have a low secrecy rate and are mainly applicable to mobile environments. In contrast, this paper presents a new physical-layer approach to secret key generation that is both fast and independent of channel variations. Our approach makes a receiver jam the signal in a manner that still allows it to decode the data, yet prevents other nodes from decoding. Results from a testbed implementation show that our method is significantly faster and more accurate than state of the art physical-layer secret key generation protocols. Specifically, while past work generates up to 44 secret bits/s with a 4% bit disagreement between the two devices, our design has a secrecy rate of 3-18 Kb/s with 0% bit disagreement

    They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices

    Get PDF
    Wireless communication has become an intrinsic part of modern implantable medical devices (IMDs). Recent work, however, has demonstrated that wireless connectivity can be exploited to compromise the confidentiality of IMDs' transmitted data or to send unauthorized commands to IMDs---even commands that cause the device to deliver an electric shock to the patient. The key challenge in addressing these attacks stems from the difficulty of modifying or replacing already-implanted IMDs. Thus, in this paper, we explore the feasibility of protecting an implantable device from such attacks without modifying the device itself. We present a physical-layer solution that delegates the security of an IMD to a personal base station called the shield. The shield uses a novel radio design that can act as a jammer-cum-receiver. This design allows it to jam the IMD's messages, preventing others from decoding them while being able to decode them itself. It also allows the shield to jam unauthorized commands---even those that try to alter the shield's own transmissions. We implement our design in a software radio and evaluate it with commercial IMDs. We find that it effectively provides confidentiality for private data and protects the IMD from unauthorized commands.National Science Foundation (U.S.). (Grant number CNS-0831244)National Science Foundation (U.S.). Graduate Research Fellowship ProgramAlfred P. Sloan Foundation. FellowshipUnited States. Dept. of Health and Human Services. Cooperative Agreement (90TR0003/01

    Simultaneous Wireless Information and Power Transfer in 5G communication

    Get PDF
    Green communication technology is expected to be widely adopted in future generation networks to improve energy efficiency and reliability of wireless communication network. Among the green communication technologies,simultaneous wireless information and power transfer (SWIPT) is adopted for its flexible energy harvesting technology through the radio frequency (RF) signa lthati sused for information transmission. Even though existing SWIPT techniques are flexible and adoptable for the wireless communication networks, the power and time resources of the signal need to be shared between infor- mation transmission and RF energy harvesting, and this compromises the quality of the signal. Therefore,SWIP Ttechniques need to be designed to allow an efficient resource allocation for communication and energy harvesting. The goal oft his thesisis to design SWIP Ttechniques that allow efficient,reliable and secure joint communications and power transference. A problem associated to SWIPT techniques combined with multi carrier signals is that the increased power requirements inherent to energy harvesting purposes can exacerbate nonlinear distortion effects at the transmitter. Therefore, we evaluate nonlinear distortion and present feasible solutions to mitigate the impact of nonlinear distortion effects on the performance.Another goal of the thesisis to take advantage of the energy harvesting signals in SWIP Ttechniques for channel estimation and security purposes.Theperformance of these SWIPT techniques is evaluated analytically, and those results are validated by simulations. It is shownthatthe proposed SWIPT schemes can have excellent performance, out performing conventional SWIPT schemes.Espera-se que aschamadas tecnologiasde green communications sejam amplamente ado- tadas em futuras redes de comunicação sem fios para melhorar a sua eficiência energética a fiabilidade.Entre estas,encontram-se as tecnologias SWIPT (Simultaneous Wireless Information and Power Transference), nas quais um sinal radio é usado para transferir simultaneamente potência e informações.Embora as técnicas SWIPT existentes sejam fle- xíveis e adequadas para as redes de comunicações sem fios, os recursos de energia e tempo do sinal precisam ser compartilhados entre a transmissão de informações e de energia, o que pode comprometer a qualidade do sinal. Deste modo,as técnicas SWIPT precisam ser projetadas para permitir uma alocação eficiente de recursos para comunicação e recolha de energia. O objetivo desta tese é desenvolver técnicas SWIPT que permitam transferência de energia e comunicações eficientes,fiáveis e seguras.Um problema associado às técnicas SWIPT combinadas com sinais multi-portadora são as dificuldades de amplificação ine- rentes à combinação de sinais de transmissão de energia com sinais de transferência de dados, que podem exacerbar os efeitos de distorção não-linear nos sinais transmitidos. Deste modo, um dos objectivos desta tese é avaliar o impacto da distorção não-linear em sinais SWIPT, e apresentar soluções viáveis para mitigar os efeitos da distorção não-linear no desempenho da transmissão de dados.Outro objetivo da tese é aproveitar as vantagens dos sinais de transferência de energia em técnicas SWIPT para efeitos de estimação de canal e segurança na comunicação.Os desempenhos dessas técnicas SWIPT são avaliados analiticamente,sendo os respectivos resultados validados por simulações.É mostrado que os esquemas SWIPT propostos podem ter excelente desempenho, superando esquemas SWIPT convencionais
    corecore