skip to main content
10.1145/2627393.2627415acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Friendly CryptoJam: a mechanism for securing physical-layer attributes

Published: 23 July 2014 Publication History

Abstract

The broadcast nature of wireless communications exposes various "transmission attributes," such as the packet size, the inter-packet times, and the modulation scheme. These attributes can be exploited by an adversary to launch passive or active attacks. A passive attacker threatens user's privacy and confidentiality by performing traffic analysis and classification, whereas an active attacker exploits captured attributes to launch selective jamming/dropping attacks. This so-called PHY-layer security problem is present even when the payload is encrypted. For example, by determining the modulation scheme, the attacker can estimate the data rate, and hence the payload size, and later use it to launch traffic classification or selective rate-adaptation attacks.
In this paper, we propose Friendly CryptoJam, a novel approach that combines analog-domain friendly jamming and modulation-level encryption. Friendly CryptoJam decorrelates the payload's modulation scheme from other transmission attributes by always "upgrading" it to the highest-order modulation scheme supported by the system (a concept we refer to as (modulation unification) using a secret pseudo-random sequence. Such upgrade is a form of transmitter-based friendly jamming. At the same time, modulation symbols are encrypted to protect unencrypted PHY-layer fields (modulation encryption). To generate and sync the secret sequence, an efficient message embedding technique based on Barker sequences is proposed, which exploits the structure of the preamble and overlays a frame-specific seed on it. We study the implications of the scheme on PHY-layer functions through simulations and USRP-based experiments. The results confirm that Friendly CryptoJam is quite successful in hiding the targeted attributes, at the cost of a small increase in the transmission power.

References

[1]
Supplement to IEEE Standard for Information Technology--Telecommunications and Information Exchange Between Systems--Local and Metropolitan Area Networks--Specific Requirements: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: High-Speed Physical Layer in the 5 GHz Band, IEEE Std 802.11a-1999, 1999.
[2]
IEEE Standard for Information Technology--Telecommunications and Information Exchange Between Systems--Local and Metropolitan Area Networks--Specific Requirements: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (Amendment 6: Medium Access Control (MAC) Security Enhancements), IEEE Std 802.11i-2004, 2004.
[3]
N. Anand, S.-J. Lee, and E. Knightly. STROBE: Actively securing wireless communications using zero-forcing beamforming. In Proc. IEEE INFOCOM'12, pages 720--728, March 2012.
[4]
J. Atkinson, O. Adetoye, M. Rio, J. Mitchell, and G. Matich. Your WiFi is leaking: Inferring user behaviour, encryption irrelevant. In Proc. IEEE Wireless Communications and Networking Conf. (WCNC'13), pages 1097--1102, April 2013.
[5]
M. Buettner, E. Anderson, G. Yee, D. Saha, A. Sheth, D. Sicker, and D. Grunwald. A phased array antenna testbed for evaluating directionality in wireless networks. In Proc. 1st ACM Int. Workshop System Evaluation for Mobile Platforms (MobiEval'07), pages 7--12, San Juan, Puerto Rico, 2007.
[6]
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Proc. IEEE Symp. Security and Privacy (SP'10), pages 191--206, May 2010.
[7]
K. Dyer, S. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-boo, I still see you: Why efficient traffic analysis countermeasures fail. In Proc. IEEE Symp. Security and Privacy (SP'12), pages 332--346, May 2012.
[8]
S. Goel and R. Negi. Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Communications, 7(6):2180--2189, June 2008.
[9]
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In Proc. ACM SIGCOMM Conf. Data Communication (SIGCOMM'11), pages 2--13, Toronto, Ontario, Canada, August 2011.
[10]
S. Gollakota and D. Katabi. ZigZag decoding: Combating hidden terminals in wireless networks. In Proc. ACM SIGCOMM Conf. Data Communication (SIGCOMM'08), pages 159--170, Seattle, WA, USA, October 2008.
[11]
X. He, H. Dai, W. Shen, and P. Ning. Is link signature dependable for wireless security? In Proc. IEEE INFOCOM'13, pages 200--204, April 2013.
[12]
A. Iacovazzi and A. Baiocchi. From ideality to practicability in statistical packet features masking. In Proc. 8th Wireless Commun. Mobile Computing Conf. (IWCMC'12), pages 456--462, August 2012.
[13]
R. P. McEvoy, F. Crowe, C. Murphy, and W. P. Marnane. Optimisation of the SHA-2 family of hash functions on FPGAs. In Proc. IEEE symp. Emerging VLSI Technologies and Architectures, March 2006.
[14]
G. Noubir, R. Rajaraman, B. Sheng, and B. Thapa. On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. In Proc. Fourth ACM Conf. Wireless Network Security (WiSec'11), pages 97--108, Hamburg, Germany, June 2011.
[15]
M. Schulz, A. Loch, and M. Hollick. Practical known-plaintext attacks against physical layer security in wireless MIMO systems. In Proc. Network and Distributed System Security Symp. (NDSS'14), February 2014.
[16]
N. Tippenhauer, L. Malisa, A. Ranganathan, and S. Capkun. On limitations of friendly jamming for confidentiality. In Proc. IEEE symp. Security and Privacy (SP '13), pages 160--173, May 2013.
[17]
C. V. Wright, S. E. Coull, and F. Monrose. Traffic morphing: An efficient defense against statistical traffic analysis. In Proc. Network and Distributed System Security symp. (NDSS'09), pages 237--250, February 2009.
[18]
F. Zhang, W. He, and X. Liu. Defending against traffic analysis in wireless networks through traffic reshaping. In Proc. 31st IEEE Int. Conf. Distributed Computing Systems (ICDCS'11), pages 593--602, June 2011.
[19]
F. Zhang, W. He, X. Liu, and P. G. Bridges. Inferring users' online activities through traffic analysis. In Proc. Fourth ACM Conf. Wireless Network Security (WiSec'11), pages 59--70, Hamburg, Germany, 2011.
[20]
Y. Zhang. Method, apparatus and system for carrier frequency offset estimation, Oct. 17 2013. US Patent App. 13/597,204.

Cited By

View all
  • (2023)Obfuscation of Human Micro-Doppler Signatures in Passive Wireless RADARIEEE Access10.1109/ACCESS.2023.326943511(40121-40127)Online publication date: 2023
  • (2021)Security of Multicarrier Time-of-Flight RangingProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485898(887-899)Online publication date: 6-Dec-2021
  • (2021)Stay Connected, Leave no TraceProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/34283294:3(1-31)Online publication date: 15-Jun-2021
  • Show More Cited By

Index Terms

  1. Friendly CryptoJam: a mechanism for securing physical-layer attributes

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '14: Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks
      July 2014
      246 pages
      ISBN:9781450329729
      DOI:10.1145/2627393
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 23 July 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. friendly jamming
      2. ieee802.11
      3. modulation encryption
      4. phy-layer security
      5. preamble
      6. side-channel information
      7. usrp

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      WiSec'14
      Sponsor:

      Acceptance Rates

      WiSec '14 Paper Acceptance Rate 25 of 96 submissions, 26%;
      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Obfuscation of Human Micro-Doppler Signatures in Passive Wireless RADARIEEE Access10.1109/ACCESS.2023.326943511(40121-40127)Online publication date: 2023
      • (2021)Security of Multicarrier Time-of-Flight RangingProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3485898(887-899)Online publication date: 6-Dec-2021
      • (2021)Stay Connected, Leave no TraceProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/34283294:3(1-31)Online publication date: 15-Jun-2021
      • (2020)Packet Header Obfuscation Using MIMOIEEE/ACM Transactions on Networking10.1109/TNET.2020.2998398(1-14)Online publication date: 2020
      • (2019)Privacy Protection for Audio Sensing Against Multi-Microphone AdversariesProceedings on Privacy Enhancing Technologies10.2478/popets-2019-00242019:2(146-165)Online publication date: 4-May-2019
      • (2016)Full Frame Encryption and Modulation Obfuscation Using Channel-Independent Preamble IdentifierIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.258256011:12(2732-2747)Online publication date: 1-Dec-2016
      • (2015)Mitigating Rate Attacks through Crypto-Coded ModulationProceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing10.1145/2746285.2746319(237-246)Online publication date: 22-Jun-2015
      • (2015)Secrecy beyond encryption: obfuscating transmission signatures in wireless communicationsIEEE Communications Magazine10.1109/MCOM.2015.735556653:12(54-60)Online publication date: Dec-2015

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media