Secrecy beyond encryption: Obfuscating transmission signatures in wireless communications

Hanif Rahbari, Marwan M Krunz

Research output: Contribution to journalArticle

9 Scopus citations


The privacy of a wireless user and the operation of a wireless network can be threatened by the leakage of side-channel information (SCI), even when encryption and authentication are employed. In this article, we describe various passive (traffic analysis) and active (jamming) attacks that are facilitated by SCI. Our goal is to highlight the need for novel PHY-layer security techniques that can be used to complement classical encryption methods. We discuss several of these techniques along with advanced hardware that exhibits promising capabilities for countering privacy and SCI-related attacks.

Original languageEnglish (US)
Article number7355566
Pages (from-to)54-60
Number of pages7
JournalIEEE Communications Magazine
Issue number12
StatePublished - Dec 1 2015


  • Communication system security
  • Encryption
  • Jamming
  • Payloads
  • Privacy
  • Wireless communication

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Secrecy beyond encryption: Obfuscating transmission signatures in wireless communications'. Together they form a unique fingerprint.

  • Cite this