ABSTRACT
Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The properties of the wireless medium are a powerful source of domain-specific information that can complement and enhance traditional security mechanisms. In this paper, we propose to utilize the fact that the radio channel decorre-lates rapidly in space, time and frequency in order to to establish new forms of authentication and confidentiality that operate at the physical layer and can be used to facilitate cross-layer security paradigms. Specifically, for authentication services, we illustrate two channel probing techniques that can be used to verify the authenticity of a transmitter. Similarly, for confidentiality, we examine several strategies for establishing shared secrets/keys between two communicators using the wireless medium. These strategies range from extracting keys from channel state information, to utilizing the channel variability to secretly disseminate keys. We then validate the feasibility of using physical layer techniques for securing wireless systems by presenting results from experiments involving the USRP/GNURadio software defined radio platform.
- N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: the insecurity of 802.11," in MobiCom '01: Proceedings of the 7th annual international conference on Mobile computing and networking, 2001, pp. 180--189. Google ScholarDigital Library
- A. Mishra, M. Shin, and W. A. Arbaugh, "Your 802.11 network has no clothes," IEEE Communications Magazine, pp. 44--51, 2002.Google Scholar
- D. Wagner, B. Schneier. and J. Kelsey, "Cryptoanalysis of the cellular encryption algorithm," in Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, 1997, pp. 526--537. Google ScholarDigital Library
- R. Housley and W. Arbaugh, "Security problems in 802.11-based networks," Commun. of the ACM, vol. 46, no. 5, pp. 31--34, 2003. Google ScholarDigital Library
- N. Cam-Winget, R. Housley, D. Wagner, and J. Walker, "Security flaws in 802.11 data link protocols," Commun. of the ACM, vol. 46, no. 5, pp. 35--39, 2003. Google ScholarDigital Library
- A. Goldsmith, Wireless Communications, Cambridge University Press, 2005. Google ScholarDigital Library
- W. C. Jakes Jr., Microwave Mobile Communications, Wiley, 1974. Google ScholarDigital Library
- W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory, Prentice Hall, 2002. Google ScholarDigital Library
- T. S. Rappaport, Wireless Communications- Principles and Practice, Prentice Hall, 2001. Google ScholarDigital Library
- A. F. Molisch, Ed., Wireless Communications, John Wiley and Sons, 2005. Google ScholarDigital Library
- A. Domazetovic, L. J. Greenstein, I. Seskar, and N. B. Mandayam, "Propagation models for short range wireless channels with predictable path geometries," IEEE Trans. on COM, vol. 53, no. 7, pp. 1123--1126, July 2005.Google ScholarCross Ref
- A. Domazetovic, L. J. Greenstein, I. Seskar, and N. B. Mandayam, "Estimating the doppler spectrum of a short range fixed wireless channel," IEEE COM Letters, vol. 7, no. 5, pp. 227--229, May 2003.Google ScholarCross Ref
- V. Erceg et. al., "Channel Models for Fized Wireless Applications," IEEE 802.16 Broadband Wireless Access Working Group, July 27, 2003.Google Scholar
- A. Mishra and W. A. Arbaugh, "An initial security analysis of the IEEE 802.1x standard," Tech. Rep. CS-TR-4328, University of Maryland, College Park, 2002.Google Scholar
- J. Tugnait, L. Tong, and Z. Ding, "Single-user channel estimation and equalization," IEEE Signal Processing Magazine, pp. 17--28, 2000.Google ScholarCross Ref
- T. S. Rappaport, "Characterization of UHF multipath radio channels in factory buildings," IEEE Trans. on Antennas and Propagation, vol. 37, pp. 1058--1069, 1989.Google ScholarCross Ref
- D. C. Cox, "Delay doppler characteristics of multipath delay spread and average excess delay for 910 MHz urban mobile radio paths," IEEE Trans. Antennas and Propagation., vol. 20, pp. 625--635, 1972.Google ScholarCross Ref
- R. J. C. Bultitude and G. K Bedal, "Propagation characteristics of microcellular mobile radio channels at 910 Mhz," IEEE J. Sel. Areas Commun., vol. 7, pp. 31--39, 1989.Google ScholarDigital Library
- G. Zhou, T. He, S. Krishnamurthy, and J. Stankovic, "Impact of radio irregularity on wireless sensor networks," in MobiSYS '04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, 2004, pp. 125--138. Google ScholarDigital Library
- A. Menezes, P. vanOorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997. Google ScholarDigital Library
- "Lecture notes on cryptography," MIT Summer Course, available at http://www.cs.ucsd.edu/users/mihir/papers/gb.html, 2001.Google Scholar
- S. Goldwasser and S. Micali, "Probabilistic encryption," Journal of Computer and System Sciences, vol. 28, pp. 270--299, 1984.Google ScholarCross Ref
- A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. Journal, vol. 54, pp. 1355--1387, 1975.Google Scholar
- I. Csiszar and J. Korner, "Broadcast channels with confidential messages," IEEE Trans. Inform. Theory, vol. 24, pp. 339--348, 1978.Google ScholarDigital Library
- T. Cover and J. Thomas, Elements of Information Theory, John Wiley and Sons, 1991. Google ScholarDigital Library
- U. M. Maurer, "Secret key agreement by public discussion from common information," IEEE Trans. Inform. Theory, vol. 39, pp. 733--742, 1993.Google ScholarDigital Library
- U. M. Maurer, "Perfect cryptographic security from partially independent channels," in STOC '91: Proceedings of the twenty-third annual ACM symposium on Theory of computing, 1991, pp. 561--571. Google ScholarDigital Library
- U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels .i. definitions and a completeness result," IEEE Trans. Inform. Theory, vol. 49, pp. 822--831, 2003. Google ScholarDigital Library
- C. H. Bennett, G. Brassard, S. Breidbart, and S. Wiesner, "Quantum cryptography, or unforgeable subway tokens," Advances in Cryptology: Crypto '82, p. 267 275, 1982.Google Scholar
- D. Wiedemann, "Quantum cryptography," Sigact News, vol. 18, pp. 48--51, 1987. Google ScholarDigital Library
- J. Hershey, A. Hassan, and R. Yarlagadda, "Unconventional cryptographic keying variable management," IEEE Trans. on Communications, vol. 43, pp. 3--6, 1995.Google ScholarCross Ref
- A. Hassan, W. Stark, J. Hershey, and S. Chennakeshu, "Cryptographic key agreement for mobile radio," Digital Signal Processing, vol. 6, pp. 207--212, 1996.Google ScholarCross Ref
- H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Commun. Letters, vol. 4, pp. 52--55, 2000.Google ScholarCross Ref
- S. Goel R. Negi, "Secret communication using artificial noise," in IEEE Vehicular Technology Conference, September 2005, pp. 1906--1910.Google Scholar
- A. O. Hero, "Secure space-time communication," IEEE Transactions on Information Theory, pp. 3235--3249, December. Google ScholarDigital Library
Index Terms
- Securing wireless systems via lower layer enforcements
Recommendations
Downlink performance analysis of a CSMA based WLAN under physical interference model
AbstractA significant amount of research work has been done on throughput and energy efficiency analysis of IEEE 802.11 based wireless local area networks (WLANs) under the simplistic protocol interference model. However, very little work has ...
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks
DIALM-POMC '05: Proceedings of the 2005 joint workshop on Foundations of mobile computingWireless LANs operating within unlicensed frequency bands require random access schemes such as CSMA/CA, so that wireless networks from different administrative domains (for example wireless community networks) may co-exist without central coordination, ...
Dynamic Group Based Efficient Access Authentication and Key Agreement Protocol for MTC in LTE-A Networks
The machine-type communication (MTC) connects millions of the smart devices and provides a large number of applications through all of our lives. Every day, MTC is undergoing ubiquitous development and becoming a crucial application of the Internet of ...
Comments