Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design

Published: 01 August 2017 Publication History

Abstract

With the proliferation of Internet of Things (IoT), the IEEE 802.15.4 physical layer is becoming increasingly popular due to its low power consumption. However, secure data communication over the network is a challenging issue because vulnerabilities in the existing security primitives lead to several attacks. The mitigation of these attacks separately adds significant computing burden on the legitimate node. In this paper, we propose a secure IEEE 802.15.4 transceiver design that mitigates multiple attacks simultaneously by using a physical layer encryption approach that reduces the computations at the upper layers. In addition to providing confidentiality and integrity services, the proposed transceiver provides sufficient complexity to various attacks, such as cryptanalysis and traffic analysis attacks. It also significantly improves the lifetime of the node in the presence of a ghost attacker by preventing the legitimate node from processing the bogus messages and hence combats against energy depletion attacks. The simulation results show that a high symbol error rate at the adversary can be achieved using the proposed transceiver without affecting the throughput at the legitimate node. In this paper, we also analyze the hardware complexity by developing an FPGA and ASIC prototype of the proposed transceiver.

References

[1]
A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications,” IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 2347–2376, Oct.–Dec. 2015.
[2]
J. A. Stankovic, “Research directions for the internet of things,” IEEE Internet Things J., vol. 1, no. 1, pp. 3–9, Feb. 2014.
[3]
Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security: Technical challenges, recent advances and future trends,” in Proc. IEEE, vol. 104, no. 9, pp. 1727–1765, Sept. 2016.
[4]
N. Doraswamy and D. Harkins, “IPSec architecture,” in IPSec: The New Security Standard for The Internet, Intranets, and Virtual Private Networks, 2nd ed. Englewood Cliffs, NJ, USA: Prentice Hall, 2003, ch. 4, pp. 59–80.
[5]
S. Raza, D. Trabalza, and T. Voigt, “6LoWPAN compressed DTLS for CoAP,” in Proc. IEEE 8th Int. Conf. Distrib. Comput. Sensor Syst., 2012, pp. 287–289.
[6]
A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Comm. Surveys Tuts., vol. 16, no. 3, pp. 1550– 1573, Jul.–Sep. 2014.
[7]
D. Goeckel, S. Vasudevan, D. Towsley, S. Adams, Z. Ding, and K. Leung, “ Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks,” IEEE J. Selected Areas Commun., vol. 29, no. 10, pp. 2067–2076, Oct. 2011.
[8]
A. Mukherjee and A. Swindlehurst, “Robust beamforming for security in MIMO wiretap channels with imperfect CSI,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. 351–361, Jan. 2011.
[9]
W. Trappe, “The challenges facing physical layer security,” IEEE Commun. Mag., vol. 53, no. 6, pp. 16–20, Jun. 2015.
[10]
A. Zquete and J. Barros, “Physical-layer encryption with stream ciphers,” in Proc. IEEE Int. Symp. Inf. Theory, Jul. 2008, pp. 106–110.
[11]
J. Zhang, A. Marshall, R. Woods, and T. Q. Duong, “Design of an OFDM physical layer encryption scheme,” in Proc. IEEE Trans. Veh. Technol., vol. PP, no. 99, p.1.
[12]
N. Sastry and D. Wagner, “Security considerations for IEEE 802.15.4 networks,” in Proc. 3rd ACM Workshop Wireless Secur., 2004, pp. 32–42.
[13]
Y. Xiao, H. Chen, B. Sun, R. Wang, and S. Sethi, “MAC security and security overhead analysis in the IEEE 802.15.4 wireless sensor networks,” J. Wireless Commun. Netw., vol. 2006, pp. 1 –12, May 2006.
[14]
M. Doomun, K. Soyjaudah, and D. Bundhoo, “Energy consumption and computational analysis of Rijndael-AES,” in Proc. IEEE/IFIP Int. Conf. Central Asia Internet, Sep. 2007, pp. 1– 6.
[15]
A. Back, U. Möller, and A. Stiglic, “ Traffic analysis attacks and trade-offs in anonymity providing systems,” Int. Workshop Inform. Hiding, Springer Berlin Heidelberg, 2001, pp. 245–257, April 2001.
[16]
E. Y. Vasserman and N. Hopper, “Vampire attacks: Draining life from wireless ad hoc sensor networks,” IEEE Trans. Mobile Comput., vol. 12, no. 2, pp. 318–332, Feb. 2013.
[17]
X. Cao, D. M. Shila, Y. Cheng, Z. Yang, Y. Zhou, and J. Chen, “ Ghost-in-ZigBee: Energy depletion attack on ZigBee-Based wireless networks,” IEEE Internet Things J., vol. 3, no. 5, pp. 816–829, Oct. 2016.
[18]
A. K. Nain and P. Rajalakshmi, “A reliable covert channel over IEEE 802.15.4 using steganography,” in Proc. IEEE World Forum Internet Things, Dec. 2016, pp. 711–716.
[19]
Y. S. Shiu, S. Y. Chang, H. C. Wu, S. C. H. Huang, and H. H. Chen, “Physical layer security in wireless networks: A tutorial,” IEEE Wireless Commun., vol. 18, no. 2, pp. 66–74, Apr. 2011.
[20]
H. Li, X. Wang, and W. Hou, “Secure transmission in OFDM systems by using time domain scrambling,” in Proc. IEEE 77th Veh. Technol. Conf., 2013, pp. 1–5.
[21]
L. Zhang, X. Xin, B. Liu, and Y. Wang, “Secure OFDM-PON based on chaos scrambling,” IEEE Photon. Technol. Lett., vol. 23, no. 14, pp. 998–1000, Jul. 2011.
[22]
R. Ma, L. Dai, Z. Wang, and J. Wang, “Secure communication in TDS OFDM system using constellation rotation and noise insertion,” IEEE Trans. Consum. Electron., vol. 56, no. 3, pp. 1328–1332, Aug. 2010.
[23]
D. Reilly and G. Kanter, “Noise-enhanced encryption for physical layer security in an OFDM radio,” in Proc. IEEE Radio Wireless Symp., Jan. 2009, pp. 344–347.
[24]
D. Dzung, “Data encryption on the physical layer of a data transmission system,” U.S. Patent 7752 430B2, Jul. 6, 2010.
[25]
F. Huo and G. Gong, “ Physical layer phase encryption for combating the traffic analysis attack,” in Proc. IEEE Int. Symp. Electromagn. Compat., Aug. 2014, pp. 604–608.
[26]
F. Huo and G. Gong, “ XOR encryption versus phase encryption, an in-depth analysis,” IEEE Trans. Electromagn. Compat., vol. 57, no. 4, pp. 903–911, Jan. 2015.
[27]
R. E. Smith, “Encrypting volumes,” in Elementary Information Security, 2nd ed. Burlington, MA, USA: Johns & Barlett Learning, 2016, ch. 9, sec. 2, pp. 379–387.
[28]
S. S. Gupta, A. Chattopadhyay, K. Sinha, S. Maitra, and B. P. Sinha, “High-performance hardware implementation for RC4 stream cipher,” IEEE Trans. Comput., vol. 62, no. 4, pp. 730–743, Apr. 2013.
[29]
P. Sepehrdad, S. Vaudenay, and M. Vuagnoux, “Discovery and exploitation of new biases in RC4,” in Proc. 18th Int. Workshop Selected Areas Cryptography, 2011, pp. 74–79. 10.1007/978-3-642-19574-7_5.
[30]
N. Salman, I. Rasool, and A. H. Kemp, “Overview of the IEEE 802.15.4 standards family for low rate wireless personal area networks,” in Proc. 7th Int. Symp. Wireless Commun. Syst., 2010, pp. 701– 705.
[31]
K.-H. Lin, W.-H. Chiu, and J.-D. Tseng, “ Low-complexity architecture of carrier frequency offset estimation and compensation for body area network systems,” Comput. Math. Appl., vol. 64. no. 5, pp. 1400–1408, Sep. 2012.
[32]
K.-H. Chen and H.-P. Ma, “A low power ZigBee baseband processor,” in Proc. Int. SoC Des. Conf., 2008, vol. 1, pp. I-40–I-43 .
[33]
W. Kluge, et al., “A fully integrated 2.4-GHz IEEE 802.15.4-Compliant transceiver for ZigBee™applications,” IEEE J. Solid-State Circuits, vol. 41, no. 12, pp. 2767– 2775, Dec. 2006.
[34]
W. Stalling, “Classical encryption techniques,” in Cryptography and Network Security: Principle and Practice, 5th ed. Englewood Cliffs, NJ, USA: Prentice Hall, 2011, ch. 2, pp. 35–38.

Cited By

View all
  • (2020)Improving IEEE 802.15.4 performance with a switched Gold sequence chip formationWireless Networks10.1007/s11276-020-02354-826:6(4579-4593)Online publication date: 15-May-2020
  • (2019)Hardware Implementation of CORDIC Based Physical Layer Phase Decryption for IEEE 802.11ahProceedings of the 7th International Conference on Communications and Broadband Networking10.1145/3330180.3330189(17-21)Online publication date: 12-Apr-2019

Index Terms

  1. A Secure Phase-Encrypted IEEE 802.15.4 Transceiver Design
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image IEEE Transactions on Computers
            IEEE Transactions on Computers  Volume 66, Issue 8
            Aug. 2017
            183 pages

            Publisher

            IEEE Computer Society

            United States

            Publication History

            Published: 01 August 2017

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 18 Dec 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2020)Improving IEEE 802.15.4 performance with a switched Gold sequence chip formationWireless Networks10.1007/s11276-020-02354-826:6(4579-4593)Online publication date: 15-May-2020
            • (2019)Hardware Implementation of CORDIC Based Physical Layer Phase Decryption for IEEE 802.11ahProceedings of the 7th International Conference on Communications and Broadband Networking10.1145/3330180.3330189(17-21)Online publication date: 12-Apr-2019

            View Options

            View options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media