81 research outputs found

    Reliable high-data rate body-centric wireless communication

    Get PDF

    Channel Sounding for the Masses: Low Complexity GNU 802.11b Channel Impulse Response Estimation

    Full text link
    New techniques in cross-layer wireless networks are building demand for ubiquitous channel sounding, that is, the capability to measure channel impulse response (CIR) with any standard wireless network and node. Towards that goal, we present a software-defined IEEE 802.11b receiver and CIR estimation system with little additional computational complexity compared to 802.11b reception alone. The system implementation, using the universal software radio peripheral (USRP) and GNU Radio, is described and compared to previous work. By overcoming computational limitations and performing direct-sequence spread-spectrum (DS-SS) matched filtering on the USRP, we enable high-quality yet inexpensive CIR estimation. We validate the channel sounder and present a drive test campaign which measures hundreds of channels between WiFi access points and an in-vehicle receiver in urban and suburban areas

    Analysis of Secret Key Randomness Exploiting the Radio Channel Variability

    Get PDF
    A few years ago, physical layer based techniques have started to be considered as a way to improve security in wireless communications. A well known problem is the management of ciphering keys, both regarding the generation and distribution of these keys. A way to alleviate such difficulties is to use a common source of randomness for the legitimate terminals, not accessible to an eavesdropper. This is the case of the fading propagation channel, when exact or approximate reciprocity applies. Although this principle has been known for long, not so many works have evaluated the effect of radio channel properties in practical environments on the degree of randomness of the generated keys. To this end, we here investigate indoor radio channel measurements in different environments and settings at either 2.4625 GHz or 5.4 GHz band, of particular interest for WIFI related standards. Key bits are extracted by quantizing the complex channel coefficients and their randomness is evaluated using the NIST test suite. We then look at the impact of the carrier frequency, the channel variability in the space, time, and frequency degrees of freedom used to construct a long secret key, in relation to the nature of the radio environment such as the LOS/NLOS character

    Experimental Study on Key Generation for Physical Layer Security in Wireless Communications

    Get PDF
    This paper presents a thorough experimental study on key generation principles, i.e., temporal variation, channel reciprocity, and spatial decorrelation, through a testbed constructed by using wireless open-access research platform. It is the first comprehensive study through: 1) carrying out a number of experiments in different multipath environments, including an anechoic chamber, a reverberation chamber, and an indoor office environment, which represents little, rich, and moderate multipath, respectively; 2) considering static, object moving, and mobile scenarios in these environments, which represents different levels of channel dynamicity; and 3) studying two most popular channel parameters, i.e., channel state information and received signal strength. Through results collected from over a hundred tests, this paper offers insights to the design of a secure and efficient key generation system. We show that multipath is essential and beneficial to key generation as it increases the channel randomness. We also find that the movement of users/objects can help introduce temporal variation/randomness and help users reach an agreement on the keys. This paper complements existing research by experiments constructed by a new hardware platform

    Key Exchange at the Physical Layer

    Get PDF
    Establishing a secret communication between two parties requires both legal parties to share a private key. One problem consists of finding a way to establish a shared secret key without the availability of a secure channel. One method uses the reciprocity and multipath interference properties of the wireless channel for this purpose. We analyze this technique in the following three aspects: vulnerabilities and attacks, improvements to the protocol and experimental validation

    Analyse et modélisation du canal radio pour la génération de clés secrÚtes

    Get PDF
    Nowadays, the security of ubiquitous wireless communications becomes more and more a crucial requirement. Even though data is widely protected via symmetric ciphering keys, a well-known difficulty is the generation and distribution of such keys. In the recent years therefore, a set of works have addressed the exploitation of inherent characteristics of the fading propagation channel for security. In particular, secret keys could be generated from the wireless channel, considered as a shared source of randomness, available merely to a pair of communicating entities. ln the present dissertation, we are interested in the approach of secret key generation (SKG) from wireless channels, especially in relating the radio channel properties to the generated keys quality. We first develop a stochastic channel model, focusing on the security with respect to the eavesdropper side, which shows a residual channel memory weil beyond a few wavelengths distance (spatially nonstationary scenarios). Then, we analyze the channel degrees of freedom (DoF) and their impact on the SKG performance in different channel conditions, especially by considering more realistic channels in both outdoor and indoor environments (respectively through simulated ray tracing data and through measurements). The results show that, even for moderately wide band (such as standardized in IEEE 802.11), the sole frequency DOF or its association with the spatial DOF is often enough for generating long keys, provided an efficient quantization method of the complex channel coefficients is used.La sĂ©curitĂ© des communications sans fil omniprĂ©sentes devient, ces derniĂšres annĂ©es, de plus en plus une exigence incontournable. Bien que la cryptographie symĂ©trique assure largement la confidentialitĂ© des donnĂ©es, la difficultĂ© concerne la gĂ©nĂ©ration et la distribution de clĂ©s secrĂštes. RĂ©cemment, des Ă©tudes indiquent que les caractĂ©ristiques inhĂ©rentes du canal de propagation peuvent ĂȘtre exploitĂ©es afin de consolider la sĂ©curitĂ©. En particulier, le canal radio fournit en effet une source d'alĂ©a commune Ă  deux utilisateurs Ă  partir de laquelle des clĂ©s secrĂštes peuvent ĂȘtre gĂ©nĂ©rĂ©es. Dans la prĂ©sente dissertation, nous nous intĂ©ressons au processus de gĂ©nĂ©ration de clĂ©s secrĂštes (SKG), tout en reliant les propriĂ©tĂ©s du canal radio Ă  la qualitĂ© des clĂ©s gĂ©nĂ©rĂ©es. D'abord nous dĂ©veloppons un modĂšle du canal stochastique, traitant la sĂ©curitĂ© du point de vue de l'espion, qui montre une mĂ©moire de canal rĂ©siduelle bien au-delĂ  d'une distance de quelques longueurs d'onde (scĂ©narios spatialement non-stationnaires). Ensuite, nous exploitons les degrĂ©s de libertĂ© (DOF) du canal et analysons leur impact sur la performance de SKG dans diffĂ©rentes conditions, tout en considĂ©rant des canaux plus rĂ©alistes en environnements extĂ©rieur et intĂ©rieur (respectivement grĂące Ă  des donnĂ©es dĂ©terministes simulĂ©es et Ă  des mesures). Les rĂ©sultats montrent que, mĂȘme pour des bandes modĂ©rĂ©es (comme standardisĂ©es dans la norme IEEE 802.11), le seul DoF de frĂ©quence ou de son association avec le DoF spatial est souvent suffisant pour gĂ©nĂ©rer des longues clĂ©s, Ă  condition d'utiliser une mĂ©thode efficace de quantification des coefficients complexes du canal

    Doctor of Philosophy

    Get PDF
    dissertationCross layer system design represents a paradigm shift that breaks the traditional layer-boundaries in a network stack to enhance a wireless network in a number of di erent ways. Existing work has used the cross layer approach to optimize a wireless network in terms of packet scheduling, error correction, multimedia quality, power consumption, selection of modulation/coding and user experience, etc. We explore the use of new cross layer opportunities to achieve secrecy and e ciency of data transmission in wireless networks. In the rst part of this dissertation, we build secret key establishment methods for private communication between wireless devices using the spatio-temporal variations of symmetric-wireless channel measurements. We evaluate our methods on a variety of wireless devices, including laptops, telosB sensor nodes, and Android smartphones, with diverse wireless capabilities. We perform extensive measurements in real-world environments and show that our methods generate high entropy secret bits at a signi cantly faster rate in comparison to existing approaches. While the rst part of this dissertation focuses on achieving secrecy in wireless networks, the second part of this dissertation examines the use of special pulse shaping lters of the lterbank multicarrier (FBMC) physical layer in reliably transmitting data packets at a very high rate. We rst analyze the mutual interference power across subcarriers used by di erent transmitters. Next, to understand the impact of FBMC beyond the physical layer, we devise a distributed and adaptive medium access control protocol that coordinates data packet tra c among the di erent nodes in the network in a best e ort manner. Using extensive simulations, we show that FBMC consistently achieves an order-of-magnitude performance improvement over orthogonal frequency division multiplexing (OFDM) in several aspects, including packet transmission delays, channel access delays, and e ective data transmission rate available to each node in static indoor settings as well as in vehicular networks
    • 

    corecore