Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3508396.3512879acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
short-paper
Open access

Malicious mmWave reconfigurable surface: eavesdropping through harmonic steering

Published: 09 March 2022 Publication History

Abstract

The use of reconfigurable surfaces is emerging as a promising solution to tackle the blockage and coverage challenges in mmWave networks. However, if such a surface is controlled by an adversary, it could make the wireless network vulnerable to a variety of new attacks by reconfiguring the wireless channel to the adversary's advantage. This paper introduces Metasurface-enabled Sideband Steering (MeSS), a novel eavesdropping framework that takes advantage of two degrees of freedom in reconfigurable surfaces, namely, space and time, to generate and steer a concealed directional sideband toward the eavesdropper while maintaining the direction of the mainband toward the legitimate client. In particular, by applying periodic time-varying control signals, MeSS creates a multi-lobe multi-frequency reflection pattern that allows the adversary to successfully capture the reflected signal with a minimal footprint on the legitimate user. We characterize the effectiveness and stealthiness of MeSS through theoretical analysis as well as simulations. Our results demonstrate the underlying effectiveness of MeSS compared to conventional side-lobe eavesdropping attacks in mmWave networks. Finally, we provide insight on potential countermeasures against the identified physical-layer attack.

References

[1]
Ertugrul Basar. 2020. Reconfigurable Intelligent Surface-Based Index Modulation: A New Beyond MIMO Paradigm for 6G. IEEE Transactions on Communications 68, 5 (2020), 3187--3196.
[2]
Ertugrul Basar, Marco Di Renzo, Julien De Rosny, Merouane Debbah, Mohamed-Slim Alouini, and Rui Zhang. 2019. Wireless Communications Through Reconfigurable Intelligent Surfaces. IEEE access 7 (2019), 116753--116773.
[3]
Alexander Becher, Zinaida Benenson, and Maximillian Dornseif. 2006. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In International Conference on Security in Pervasive Computing. Springer, 104--118.
[4]
Jun Yan Dai, Jie Zhao, Qiang Cheng, and Tie Jun Cui. 2018. Independent Control of Harmonic Amplitudes and Phases Via a Time-Domain Digital Coding Metasurface. Light: Science & Applications 7, 1 (2018), 1--10.
[5]
Manideep Dunna, Chi Zhang, Daniel Sievenpiper, and Dinesh Bharadia. 2020. ScatterMIMO: Enabling Virtual MIMO with Smart Surfaces. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--14.
[6]
Yasaman Ghasempour, Claudio RCM Da Silva, Carlos Cordeiro, and Edward W Knightly. 2017. IEEE 802.11 ay: Next-Generation 60 GHz Communication for 100 Gb/s Wi-Fi. IEEE Communications Magazine 55, 12 (2017), 186--192.
[7]
Lei Hu, Guyue Li, Hongyi Luo, and Aiqun Hu. 2021. On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation. In 2021 IEEE 94th Vehicular Technology Conference (VTC2021-Fall). 1--5.
[8]
Ke-Wen Huang and Hui-Ming Wang. 2020. Intelligent Reflecting Surface Aided Pilot Contamination Attack and Its Countermeasure. IEEE Transactions on Wireless Communications 20, 1 (2020), 345--359.
[9]
IEEE. [n.d.]. 802.11ay Task Group. http://www.ieee802.org/11/Reports/tgay_update.htm.
[10]
Ish Kumar Jain, Raghav Subbaraman, and Dinesh Bharadia. 2021. Two Beams Are Better Than One: Towards Reliable and High Throughput mmWave Links. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference. 488--502.
[11]
Ying Ju, Yanzi Zhu, Hui-Ming Wang, Qingqi Pei, and Haitao Zheng. 2020. Artificial Noise Hopping: A Practical Secure Transmission Technique With Experimental Analysis for Millimeter Wave Systems. IEEE Systems Journal 14, 4 (2020), 5121--5132.
[12]
Zhuqi Li, Yaxiong Xie, Longfei Shangguan, Rotman Ivan Zelaya, Jeremy Gummeson, Wenjun Hu, and Kyle Jamieson. 2019. Towards Programming the Radio Environment with Large Arrays of Inexpensive Antennas. In 16th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 19). 285--300.
[13]
Shuo Liu, Tie Jun Cui, Lei Zhang, Quan Xu, Qiu Wang, Xiang Wan, Jian Qiang Gu, Wen Xuan Tang, Mei Qing Qi, Jia Guang Han, et al. 2016. Convolution Operations on Coding Metasurface to Reach Flexible and Continuous Controls of Terahertz Beams. Advanced Science 3, 10 (2016), 1600156.
[14]
Bin Lyu, Dinh Thai Hoang, Shimin Gong, Dusit Niyato, and Dong In Kim. 2020. IRS-Based Wireless Jamming Attacks: When Jammers Can Attack Without Power. IEEE Wireless Communications Letters 9, 10 (2020), 1663--1667.
[15]
MACOM [n.d.]. MADP-000907-14020x Solderable AlGaAs Flip Chip PIN. MACOM. https://cdn.macom.com/datasheets/MADP-000907-14020x.pdf Rev. V8.
[16]
Vasileios Mavroeidis, Kamer Vishi, Mateusz D Zych, and Audun Jøsang. 2018. The Impact of Quantum Computing on Present Cryptography. International Journal of Advanced Computer Science and Applications (IJACSA) 9, 3 (2018), 405--414.
[17]
Yong Niu, Yong Li, Depeng Jin, Li Su, and Athanasios V Vasilakos. 2015. A Survey of Millimeter Wave Communications (mmWave) for 5G: Opportunities and Challenges. Wireless networks 21, 8 (2015), 2657--2676.
[18]
Swetank Kumar Saha, Yasaman Ghasempour, Muhammad Kumail Haider, Tariq Siddiqui, Paulo De Melo, Neerad Somanchi, Luke Zakrajsek, Arjun Singh, Roshan Shyamsunder, Owen Torres, et al. 2019. X60: A Programmable Testbed for Wideband 60 GHz Wlans with Phased Arrays. Computer Communications 133 (2019), 77--88.
[19]
HE Shanks and RW Bickmore. 1959. Four-Dimensional Electromagnetic Radiators. Canadian Journal of Physics 37, 3 (1959), 263--275.
[20]
Paul Staat, Harald Elders-Boll, Christian Zenger, and Christof Paar. 2021. Mirror Mirror on the Wall: Next-Generation Wireless Jamming Attacks Based on Software-Controlled Surfaces. arXiv preprint arXiv:2107.01709 (2021).
[21]
Xin Tan, Zhi Sun, Dimitrios Koutsonikolas, and Josep M Jornet. 2018. Enabling Indoor Mobile Millimeter-Wave Networks Based on Smart Reflect-Arrays. In IEEE INFOCOM. IEEE, 270--278.
[22]
Chao Wang and Hui-Ming Wang. 2016. Physical Layer Security in Millimeter Wave Cellular Networks. IEEE Transactions on Wireless Communications 15, 8 (2016), 5569--5585.
[23]
Nan Yang, Lifeng Wang, Giovanni Geraci, Maged Elkashlan, Jinhong Yuan, and Marco Di Renzo. 2015. Safeguarding 5G Wireless Communication Networks Using Physical Layer Security. IEEE Communications Magazine 53, 4 (2015), 20--27.
[24]
Lei Zhang, Xiao Qing Chen, Shuo Liu, Qian Zhang, Jie Zhao, Jun Yan Dai, Guo Dong Bai, Xiang Wan, Qiang Cheng, Giuseppe Castaldi, et al. 2018. Space-Time-Coding Digital Metasurfaces. Nature communications 9, 1 (2018), 1--11.
[25]
Yang Zhao, Jun Zhao, Wenchao Zhai, Sumei Sun, Dusit Niyato, and Kwok-Yan Lam. 2021. A Survey of 6G Wireless Communications: Emerging Technologies. In Advances in Information and Communication, Kohei Arai (Ed.). Springer International Publishing, Cham, 150--170.
[26]
Yongxu Zhu, Lifeng Wang, Kai-Kit Wong, and Robert W Heath. 2017. Secure Communications in Millimeter Wave Ad Hoc Networks. IEEE Transactions on Wireless Communications 16, 5 (2017), 3205--3217.

Cited By

View all
  • (2024)Malicious RIS Versus Massive MIMO: Securing Multiple Access Against RIS-Based Jamming AttacksIEEE Wireless Communications Letters10.1109/LWC.2024.335532213:4(989-993)Online publication date: Apr-2024
  • (2023)A Survey of mmWave-Based Human Sensing: Technology, Platforms and ApplicationsIEEE Communications Surveys & Tutorials10.1109/COMST.2023.329830025:4(2052-2087)Online publication date: 25-Jul-2023
  • (2023)RMDM: Using Random Meta-Atoms to Send Directional Misinformation to Eavesdroppers2023 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS59707.2023.10288796(1-9)Online publication date: 2-Oct-2023
  • Show More Cited By

Index Terms

  1. Malicious mmWave reconfigurable surface: eavesdropping through harmonic steering

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HotMobile '22: Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and Applications
    March 2022
    137 pages
    ISBN:9781450392181
    DOI:10.1145/3508396
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 March 2022

    Check for updates

    Author Tags

    1. eavesdropping
    2. physical layer security
    3. reconfigurable surfaces

    Qualifiers

    • Short-paper

    Conference

    HotMobile '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 96 of 345 submissions, 28%

    Upcoming Conference

    HOTMOBILE '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)278
    • Downloads (Last 6 weeks)27
    Reflects downloads up to 21 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Malicious RIS Versus Massive MIMO: Securing Multiple Access Against RIS-Based Jamming AttacksIEEE Wireless Communications Letters10.1109/LWC.2024.335532213:4(989-993)Online publication date: Apr-2024
    • (2023)A Survey of mmWave-Based Human Sensing: Technology, Platforms and ApplicationsIEEE Communications Surveys & Tutorials10.1109/COMST.2023.329830025:4(2052-2087)Online publication date: 25-Jul-2023
    • (2023)RMDM: Using Random Meta-Atoms to Send Directional Misinformation to Eavesdroppers2023 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS59707.2023.10288796(1-9)Online publication date: 2-Oct-2023
    • (2022)Towards Terahertz Wireless Authentication with Unique Aperture Fingerprints using Leaky-Wave Antennas2022 47th International Conference on Infrared, Millimeter and Terahertz Waves (IRMMW-THz)10.1109/IRMMW-THz50927.2022.9895749(1-2)Online publication date: 28-Aug-2022
    • (2022)A General Security Approach for Soft-information Decoding against Smart Bursty Jammers2022 IEEE Globecom Workshops (GC Wkshps)10.1109/GCWkshps56602.2022.10008541(245-251)Online publication date: 4-Dec-2022

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media