Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2939918.2939933acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article
Public Access

Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding

Published: 18 July 2016 Publication History

Abstract

Physical layer security for wireless communication is broadly considered as a promising approach to protect data confidentiality against eavesdroppers. However, despite its ample theoretical foundation, the transition to practical implementations of physical-layer security still lacks success. A close inspection of proven vulnerable physical-layer security designs reveals that the flaws are usually overlooked when the scheme is only evaluated against an inferior, single-antenna eavesdropper. Meanwhile, the attacks exposing vulnerabilities often lack theoretical justification. To reduce the gap between theory and practice, we posit that a physical-layer security scheme must be studied under multiple adversarial models to fully grasp its security strength. In this regard, we evaluate a specific physical-layer security scheme, i.e. orthogonal blinding, under multiple eavesdropper settings. We further propose a practical "ciphertext-only attack" that allows eavesdroppers to recover the original message by exploiting the low entropy fields in wireless packets. By means of simulation, we are able to reduce the symbol error rate at an eavesdropper below 1% using only the eavesdropper's receiving data and a general knowledge about the format of the wireless packets.

References

[1]
Xiangyun Zhou, Lingyang Song, and Yan Zhang. Physical layer security in wireless communications. Crc Press, 2013.
[2]
Shyamnath Gollakota et al. "They can hear your heart- beats: non-invasive security for implantable medical devices". In: ACM SIGCOMM Computer Communi- cation Review 41.4 (2011), pp. 2--13.
[3]
Shyamnath Gollakota and Dina Katabi. "Physical layer wireless security made fast and channel independent". In: INFOCOM, 2011 Proceedings IEEE. IEEE. 2011, pp. 1125--1133.
[4]
Nils Ole Tippenhauer et al. "On limitations of friendly jamming for con dentiality". In: Security and Privacy (SP), 2013 IEEE Symposium on. IEEE. 2013, pp. 160--173.
[5]
Daniel Steinmetzer, Matthias Schulz, and Matthias Hollick. "Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief". In: Proceedings of the 2015 ACM Conference on Security and Privacy in Wireless Mobile Networks. WiSec '15. 2015.
[6]
N. Anand, Sung-Ju Lee, and E.W. Knightly. "STROBE: actively securing wireless communications using Zero- Forcing Beamforming". In: Proc. INFOCOM'12. 2012, pp. 720--728.
[7]
Matthias Schulz, Adrian Loch, and Matthias Hollick. "Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems". In: Proc. NDSS'14 . 2014.
[8]
Yao Zheng et al. "Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security". In: IEEE Wireless Communications Letters 4.1 (Feb. 2015), pp. 34--37.
[9]
Aaron D Wyner. "The wire-tap channel". In: Bell Sys- tem Technical Journal, The 54.8 (1975), pp. 1355--1387.
[10]
S. Leung-Yan-Cheong and M. Hellman. "The Gaussian wire-tap channel". In: IEEE Transactions on Information Theory 24.4 (July 1978), pp. 451--456.
[11]
Ashish Khisti and Gregory W Wornell. "Secure trans- mission with multiple antennas I: The MISOME wire- tap channel". In: Information Theory, IEEE Transactions on 56.7 (2010), pp. 3088--3104.
[12]
Ashish Khisti and Gregory W Wornell. "Secure trans- mission with multiple antennas|Part II: The MIMOME wiretap channel". In: Information Theory, IEEE Trans- actions on 56.11 (2010), pp. 5515--5532.
[13]
Yu-Chih Tung et al. "Vulnerability and Protection of Channel State Information in Multiuser MIMO Net- works". In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS '14. 2014.
[14]
The Institute of Electrical and Inc. Electronic Engineers. "IEEE Standard 802.11--2013". English. In: IEEE Standard for Information technology (2013).
[15]
Mladen Kovacevic, Ivan Stanojevic, and Vojin Senk. "On the hardness of entropy minimization and related problems". In: Information Theory Workshop (ITW),

Cited By

View all
  • (2024)Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00042(2740-2758)Online publication date: 19-May-2024
  • (2020)Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping ReviewIEEE Access10.1109/ACCESS.2020.29843768(84352-84361)Online publication date: 2020
  • (2017)PHY-layer security is no alternative to cryptographyProceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3098243.3098271(160-162)Online publication date: 18-Jul-2017

Index Terms

  1. Profiling the Strength of Physical-Layer Security: A Study in Orthogonal Blinding

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
        July 2016
        242 pages
        ISBN:9781450342704
        DOI:10.1145/2939918
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 18 July 2016

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. ciphertext-only attack
        2. cryptanalysis
        3. information-theoretic security analysis
        4. orthogonal blinding
        5. physical-layer security

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        WiSec'16
        Sponsor:

        Acceptance Rates

        WiSec '16 Paper Acceptance Rate 13 of 51 submissions, 25%;
        Overall Acceptance Rate 98 of 338 submissions, 29%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)47
        • Downloads (Last 6 weeks)9
        Reflects downloads up to 14 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Guessing on Dominant Paths: Understanding the Limitation of Wireless Authentication Using Channel State Information2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00042(2740-2758)Online publication date: 19-May-2024
        • (2020)Solutions for Mitigating Cybersecurity Risks Caused by Legacy Software in Medical Devices: A Scoping ReviewIEEE Access10.1109/ACCESS.2020.29843768(84352-84361)Online publication date: 2020
        • (2017)PHY-layer security is no alternative to cryptographyProceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3098243.3098271(160-162)Online publication date: 18-Jul-2017
        • (2016)DEMOProceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/2939918.2942418(201-203)Online publication date: 18-Jul-2016

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media