Secrecy beyond encryption: Obfuscating transmission signatures in wireless communications

Hanif Rahbari, Marwan Krunz

Research output: Contribution to journalArticlepeer-review

13 Scopus citations


The privacy of a wireless user and the operation of a wireless network can be threatened by the leakage of side-channel information (SCI), even when encryption and authentication are employed. In this article, we describe various passive (traffic analysis) and active (jamming) attacks that are facilitated by SCI. Our goal is to highlight the need for novel PHY-layer security techniques that can be used to complement classical encryption methods. We discuss several of these techniques along with advanced hardware that exhibits promising capabilities for countering privacy and SCI-related attacks.

Original languageEnglish (US)
Article number7355566
Pages (from-to)54-60
Number of pages7
JournalIEEE Communications Magazine
Issue number12
StatePublished - Dec 2015


  • Communication system security
  • Encryption
  • Jamming
  • Payloads
  • Privacy
  • Wireless communication

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Secrecy beyond encryption: Obfuscating transmission signatures in wireless communications'. Together they form a unique fingerprint.

Cite this