Friendly CryptoJam: A mechanism for securing physical-layer attributes

Hanif Rahbari, Marwan Krunz

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

The broadcast nature of wireless communications exposes various "transmission attributes," such as the packet size, the inter-packet times, and the modulation scheme. These attributes can be exploited by an adversary to launch passive or active attacks. A passive attacker threatens user's privacy and confidentiality by performing traffic analysis and classification, whereas an active attacker exploits captured attributes to launch selective jamming/dropping attacks. This so-called PHY-layer security problem is present even when the payload is encrypted. For example, by determining the modulation scheme, the attacker can estimate the data rate, and hence the payload size, and later use it to launch traffic classification or selective rate-adaptation attacks. In this paper, we propose Friendly CryptoJam, a novel approach that combines analog-domain friendly jamming and modulation-level encryption. Friendly CryptoJam decorrelates the payload's modulation scheme from other transmission attributes by always "upgrading" it to the highest-order modulation scheme supported by the system (a concept we refer to as (modulation unification) using a secret pseudo-random sequence. Such upgrade is a form of transmitter-based friendly jamming. At the same time, modulation symbols are encrypted to protect unencrypted PHY-layer fields (modulation encryption). To generate and sync the secret sequence, an efficient message embedding technique based on Barker sequences is proposed, which exploits the structure of the preamble and overlays a frame-specific seed on it. We study the implications of the scheme on PHY-layer functions through simulations and USRP-based experiments. The results confirm that Friendly CryptoJam is quite successful in hiding the targeted attributes, at the cost of a small increase in the transmission power.

Original languageEnglish (US)
Title of host publicationWiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks
PublisherAssociation for Computing Machinery
Pages129-140
Number of pages12
ISBN (Print)9781450329729
DOIs
StatePublished - 2014
Event7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014 - Oxford, United Kingdom
Duration: Jul 23 2014Jul 25 2014

Publication series

NameWiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks

Other

Other7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014
Country/TerritoryUnited Kingdom
CityOxford
Period7/23/147/25/14

Keywords

  • friendly jamming
  • ieee802.11
  • modulation encryption
  • phy-layer security
  • preamble
  • side-channel information
  • usrp

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Friendly CryptoJam: A mechanism for securing physical-layer attributes'. Together they form a unique fingerprint.

Cite this