Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3098243.3098271acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

PHY-layer security is no alternative to cryptography

Published: 18 July 2017 Publication History

Abstract

In recent works, numerous physical-layer security systems have been proposed as alternatives to classic cryptography. Such systems aim to use the intrinsic properties of radio signals and the wireless medium to provide confidentiality and authentication to wireless devices. However, fundamental vulnerabilities are often discovered in these systems shortly after their inception. We therefore challenge the assumptions made by existing physical-layer security systems, and postulate that weaker assumptions are needed in order to adapt for practical scenarios. We also argue that if no computational advantage over an adversary can be ensured, secure communication cannot be realistically achieved.

References

[1]
O. R. Afolabi, K. Kim, and A. Ahmad. On secure spectrum sensing in cognitive radio networks using emitters electromagnetic signature. In Proceedings of 18th Internatonal Conference on Computer Communications and Networks, pages 1--5. IEEE, 2009.
[2]
N. Anand, S.-J. Lee, and E. W. Knightly. Strobe: Actively securing wireless communications using zero-forcing beamforming. In INFOCOM, pages 720--728. IEEE, 2012.
[3]
B. Danev, T. S. Heydt-Benjamin, and S. Capkun. Physical-layer Identification of RFID Devices. In Usenix Security Symposium, pages 199--214, 2009.
[4]
B. Danev, H. Luecken, S. Capkun, and K. El Defrawy. Attacks on physical-layer identification. In Proceedings of the third ACM conference on Wireless network security, pages 89--98. ACM, 2010.
[5]
B. Danev, D. Zanetti, and S. Capkun. On physical-layer identification of wireless devices. ACM Computing Surveys (CSUR), 45(1):6, 2012.
[6]
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor. Cooperative jamming for wireless physical layer security. In IEEE/SP 15th Workshop on Statistical Signal Processing, pages 417--420. IEEE, 2009.
[7]
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: non-invasive security for implantable medical devices. ACM SIGCOMM Computer Communication Review, 41(4):2--13, 2011.
[8]
J. Hall, M. Barbeau, and E. Kranakis. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In Communications, Internet, and Information Technology, pages 201--206, 2004.
[9]
B. W. Ramsey, T. D. Stubbs, B. E. Mullins, M. A. Temple, and M. A. Buckner. Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers. International Journal of Critical Infrastructure Protection, 8:27--39, 2015.
[10]
B. W. Ramsey, M. A. Temple, and B. E. Mullins. PHY foundation for multi-factor ZigBee node authentication. In Global Communications Conference (GLOBECOM), pages 795--800. IEEE, 2012.
[11]
K. B. Rasmussen and S. Capkun. Implications of radio fingerprinting on the security of sensor networks. In Third International Conference on Security and Privacy in Communications Networks, pages 331--340. IEEE, 2007.
[12]
S. U. Rehman, K. Sowerby, and C. Coghill. RF fingerprint extraction from the energy envelope of an instantaneous transient signal. In Australian Communications Theory Workshop (AusCTW), pages 90--95. IEEE, 2012.
[13]
D. R. Reising, M. A. Temple, and M. J. Mendenhall. Improving intra-cellular security using air monitoring with RF fingerprints. In Wireless Communications and Networking Conference (WCNC), pages 1--6. IEEE, 2010.
[14]
M. Schulz, A. Loch, and M. Hollick. Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. In NDSS, 2014.
[15]
N. O. Tippenhauer, L. Malisa, A. Ranganathan, and S. Capkun. On limitations of friendly jamming for confidentiality. In IEEE Symposium on Security and Privacy (SP), pages 160--173. IEEE, 2013.
[16]
O. Ureten and N. Serinken. Wireless security through RF fingerprinting. Canadian Journal of Electrical and Computer Engineering, 32(1):27--33, 2007.
[17]
Q. Wang, K. Xu, and K. Ren. Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE Journal on selected areas in communications, 30(9):1666--1674, 2012.
[18]
A. D. Wyner. The wire-tap channel. Bell Labs Technical Journal, 54(8):1355--1387, 1975.
[19]
A. Yener and S. Ulukus. Wireless physical-layer security: lessons learned from information theory. Proceedings of the IEEE, 103(10):1814--1825, 2015.
[20]
K. Zeng. Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine, 53(6):33--39, 2015.
[21]
Y. Zheng, M. Schulz, W. Lou, Y. T. Hou, and M. Hollick. Profiling the strength of physical-layer security: A study in orthogonal blinding. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pages 21--30. ACM, 2016.

Cited By

View all
  • (2023)Polarization Fingerprint-Based LoRaWAN Physical Layer AuthenticationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329561518(4593-4608)Online publication date: 2023
  • (2021)Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of ThingsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.304531816(1896-1911)Online publication date: 2021
  • (2021)A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challengesTransactions on Emerging Telecommunications Technologies10.1002/ett.4270Online publication date: 10-Apr-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WiSec '17: Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks
July 2017
297 pages
ISBN:9781450350846
DOI:10.1145/3098243
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 July 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. PHY-layer security
  2. cryptography
  3. opinion

Qualifiers

  • Short-paper

Funding Sources

  • Research Foundation Flanders (FWO)

Conference

WiSec '17
Sponsor:

Acceptance Rates

Overall Acceptance Rate 98 of 338 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)3
Reflects downloads up to 21 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Polarization Fingerprint-Based LoRaWAN Physical Layer AuthenticationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.329561518(4593-4608)Online publication date: 2023
  • (2021)Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of ThingsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.304531816(1896-1911)Online publication date: 2021
  • (2021)A comprehensive survey of physical layer security over fading channels: Classifications, applications, and challengesTransactions on Emerging Telecommunications Technologies10.1002/ett.4270Online publication date: 10-Apr-2021
  • (2020)A New Frontier for IoT Security Emerging From Three Decades of Key Generation Relying on Wireless ChannelsIEEE Access10.1109/ACCESS.2020.30120068(138406-138446)Online publication date: 2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media