Full frame encryption and modulation obfuscation using channel-independent preamble identifier

Hanif Rahbari, Marwan M Krunz

Research output: Contribution to journalArticle

6 Citations (Scopus)

Abstract

The broadcast nature of wireless communications exposes various transmission attributes, such as the packet size, inter-packet times, and the modulation scheme. These attributes can be exploited by an adversary to launch passive (e.g., traffic analysis) or selective jamming attacks. This security problem is present even when frame headers and payloads can be encrypted. For example, by determining the modulation scheme, the attacker can estimate the data rate, and hence the payload size. In this paper, we propose Friendly CryptoJam (FCJ), a scheme that decorrelates the payload's modulation scheme from other transmission attributes by embedding information symbols into the constellation map of the highest-order modulation scheme supported by the system (a concept we refer to as indistinguishable modulation unification). Such unification is done using the least-complex trellis-coded modulation schemes, which are combined with a secret pseudo-random sequence in FCJ to conceal the rate-dependent pattern imposed by the code. It also preserves the bit error rate performance of the payload's original modulation scheme. At the same time, modulated symbols are encrypted to hide PHY-/MAC layer fields. To identify the Tx and synchronously generate the secret sequence at the Tx and Rx, an efficient identifier embedding technique based on Barker sequences is proposed, which exploits the structure of the preamble and overlays a frame-specific identifier on it. We study the implications of the scheme on PHY-layer functions through simulations and testbed experiments. Our results confirm the efficiency of FCJ in hiding the targeted attributes.

Original languageEnglish (US)
Article number7495006
Pages (from-to)2732-2747
Number of pages16
JournalIEEE Transactions on Information Forensics and Security
Volume11
Issue number12
DOIs
StatePublished - Dec 1 2016

Fingerprint

Cryptography
Modulation
Jamming
Testbeds
Telecommunication traffic
Bit error rate
Communication
Experiments

Keywords

  • modulation unification
  • PHY-layer security
  • preamble
  • side-channel information
  • Universal Software Radio Peripheral (USRP)
  • untraceable TCM

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Cite this

Full frame encryption and modulation obfuscation using channel-independent preamble identifier. / Rahbari, Hanif; Krunz, Marwan M.

In: IEEE Transactions on Information Forensics and Security, Vol. 11, No. 12, 7495006, 01.12.2016, p. 2732-2747.

Research output: Contribution to journalArticle

@article{0bbf50fdc24a4cad96fa85db4f0bb6a7,
title = "Full frame encryption and modulation obfuscation using channel-independent preamble identifier",
abstract = "The broadcast nature of wireless communications exposes various transmission attributes, such as the packet size, inter-packet times, and the modulation scheme. These attributes can be exploited by an adversary to launch passive (e.g., traffic analysis) or selective jamming attacks. This security problem is present even when frame headers and payloads can be encrypted. For example, by determining the modulation scheme, the attacker can estimate the data rate, and hence the payload size. In this paper, we propose Friendly CryptoJam (FCJ), a scheme that decorrelates the payload's modulation scheme from other transmission attributes by embedding information symbols into the constellation map of the highest-order modulation scheme supported by the system (a concept we refer to as indistinguishable modulation unification). Such unification is done using the least-complex trellis-coded modulation schemes, which are combined with a secret pseudo-random sequence in FCJ to conceal the rate-dependent pattern imposed by the code. It also preserves the bit error rate performance of the payload's original modulation scheme. At the same time, modulated symbols are encrypted to hide PHY-/MAC layer fields. To identify the Tx and synchronously generate the secret sequence at the Tx and Rx, an efficient identifier embedding technique based on Barker sequences is proposed, which exploits the structure of the preamble and overlays a frame-specific identifier on it. We study the implications of the scheme on PHY-layer functions through simulations and testbed experiments. Our results confirm the efficiency of FCJ in hiding the targeted attributes.",
keywords = "modulation unification, PHY-layer security, preamble, side-channel information, Universal Software Radio Peripheral (USRP), untraceable TCM",
author = "Hanif Rahbari and Krunz, {Marwan M}",
year = "2016",
month = "12",
day = "1",
doi = "10.1109/TIFS.2016.2582560",
language = "English (US)",
volume = "11",
pages = "2732--2747",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "12",

}

TY - JOUR

T1 - Full frame encryption and modulation obfuscation using channel-independent preamble identifier

AU - Rahbari, Hanif

AU - Krunz, Marwan M

PY - 2016/12/1

Y1 - 2016/12/1

N2 - The broadcast nature of wireless communications exposes various transmission attributes, such as the packet size, inter-packet times, and the modulation scheme. These attributes can be exploited by an adversary to launch passive (e.g., traffic analysis) or selective jamming attacks. This security problem is present even when frame headers and payloads can be encrypted. For example, by determining the modulation scheme, the attacker can estimate the data rate, and hence the payload size. In this paper, we propose Friendly CryptoJam (FCJ), a scheme that decorrelates the payload's modulation scheme from other transmission attributes by embedding information symbols into the constellation map of the highest-order modulation scheme supported by the system (a concept we refer to as indistinguishable modulation unification). Such unification is done using the least-complex trellis-coded modulation schemes, which are combined with a secret pseudo-random sequence in FCJ to conceal the rate-dependent pattern imposed by the code. It also preserves the bit error rate performance of the payload's original modulation scheme. At the same time, modulated symbols are encrypted to hide PHY-/MAC layer fields. To identify the Tx and synchronously generate the secret sequence at the Tx and Rx, an efficient identifier embedding technique based on Barker sequences is proposed, which exploits the structure of the preamble and overlays a frame-specific identifier on it. We study the implications of the scheme on PHY-layer functions through simulations and testbed experiments. Our results confirm the efficiency of FCJ in hiding the targeted attributes.

AB - The broadcast nature of wireless communications exposes various transmission attributes, such as the packet size, inter-packet times, and the modulation scheme. These attributes can be exploited by an adversary to launch passive (e.g., traffic analysis) or selective jamming attacks. This security problem is present even when frame headers and payloads can be encrypted. For example, by determining the modulation scheme, the attacker can estimate the data rate, and hence the payload size. In this paper, we propose Friendly CryptoJam (FCJ), a scheme that decorrelates the payload's modulation scheme from other transmission attributes by embedding information symbols into the constellation map of the highest-order modulation scheme supported by the system (a concept we refer to as indistinguishable modulation unification). Such unification is done using the least-complex trellis-coded modulation schemes, which are combined with a secret pseudo-random sequence in FCJ to conceal the rate-dependent pattern imposed by the code. It also preserves the bit error rate performance of the payload's original modulation scheme. At the same time, modulated symbols are encrypted to hide PHY-/MAC layer fields. To identify the Tx and synchronously generate the secret sequence at the Tx and Rx, an efficient identifier embedding technique based on Barker sequences is proposed, which exploits the structure of the preamble and overlays a frame-specific identifier on it. We study the implications of the scheme on PHY-layer functions through simulations and testbed experiments. Our results confirm the efficiency of FCJ in hiding the targeted attributes.

KW - modulation unification

KW - PHY-layer security

KW - preamble

KW - side-channel information

KW - Universal Software Radio Peripheral (USRP)

KW - untraceable TCM

UR - http://www.scopus.com/inward/record.url?scp=84994827771&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84994827771&partnerID=8YFLogxK

U2 - 10.1109/TIFS.2016.2582560

DO - 10.1109/TIFS.2016.2582560

M3 - Article

AN - SCOPUS:84994827771

VL - 11

SP - 2732

EP - 2747

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 12

M1 - 7495006

ER -