Advertisement

Secure Interleaving - Physical Layer Security Enhancement of OFDM Based System

  • Muhammad Asif Khan
  • Varun Jeoti
  • Rana Shahid Manzoor
Part of the Communications in Computer and Information Science book series (CCIS, volume 171)

Abstract

Interleavers are typically used to distribute burst of errors, so they appear as simple random errors. Alternatively, if interleaving patterns are kept secure, then these patterns can be introduced as a physical (PHY) layer security device. In this paper, an efficient technique to introduce security at physical (PHY) layer is proposed to enhance the security of 802.11i, which is designed to improve the security at medium access control. Since it does not emphasize on availability therefore several denial of service (DoS) attacks are possible. The DoS attacks are easy to mount because management and control frames are unprotected and so are MAC headers. This paper proposes a secure seed based random interleaving technique to scramble the OFDM constellation symbols to encrypt data transmission to resist these malicious attacks. In order to analyze the suitability of proposed technique as PHY layer security device keysensitivity analysis is carried out. The scrambling is completely reversible with the use of appropriate key. However, use of a wrong initial condition even at 4th decimal point produces entirely different sequence resulting in erroneous constellations with equal probability. To analyze the effectiveness of proposed technique various security attacks are analyzed in detail.

Keywords

Medium Access Control Chaotic Sequence Layer Security Control Frame Plaintext Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Liu, C., Yu, J.: A Solution to WLAN Authentication and Association DoS Attacks. IAENG International Journal of Computer Science 34(1) (2007)Google Scholar
  2. 2.
    Malekzadeh, M., Abdul Ghani, A.A., Ahmad Zulkarnain, Z., Muda, Z.: Security Improvement for Management Frames in IEEE 802.11 Wireless Networks. IJCSNS International Journal of Computer Science and Network Security 7(6) (June 2007)Google Scholar
  3. 3.
    Asif Khan, M., Asim, M., Jeoti, V.: Chaos Based Constellation Scrambling: Security and Interleaving Issues. In: ITSIM 2008, pp. 1–7 (August 26-28, 2008) ISBN: 978-1-4244-2327-9Google Scholar
  4. 4.
    Hiltunen, K.: WLAN attacks and risks, http://www.comlab.hut.fi/opetus/333/2004slides/topic30.pdf
  5. 5.
    Xiao, Y., Pan, Y., Du, X., Bandela, C., Dass, K.: Security mechanism, attacks, and security enhancements for the IEEE 802.11 WLANs. International Journal of Wireless and Mobile Computing, special issue on Medium Access Control for WLANs, PANs and Sensor Network 1(3/4), 276–288 (2005)Google Scholar
  6. 6.
    He, C., Mitchell, J.C.: Security analysis and improvements for 802.11i. In: The 12th Annual Network and Distributed System Security Symposium, NDSS 2005, pp. 90–110 (February 2005)Google Scholar
  7. 7.
    Baranovsky, A., Daems, D.: The design of one dimensional chaotic maps with prescribed statistical properties. International Journal of Bifurcation of Chaos & Fractals 5(6) (1995)Google Scholar
  8. 8.
    Asim, M., Jeoti, V.: Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback. In: IEEE International Conference on Intelligent and Advanced Systems, pp. 736–741 (November 2007) ISBN: 978-1-4244-1355-3Google Scholar
  9. 9.
    Asif Khan, M.: A Novel Seed Based Random Interleaver Design for OFDM System and its PHY layer Security Issues, Master’s Thesis, Universiti Teknologi PETRONAS (2009)Google Scholar
  10. 10.
    Bellardo, J., Savage, S.: 802.11 Denial-of-Service attacks: Real vulnerabilities and practical solution. In: Usenix Security Symposium, pp. 15–28 (August 4-8, 2003)Google Scholar
  11. 11.
    Liu, C., Yu, J.T.: Review and Analysis of Wireless LAN Security Attacks and Solutions. Journal of International Engineering Consortium 59, 539–554 (2006) ISBN: 978-1-931695-53-4Google Scholar
  12. 12.
    Liu, C., Yu, J.T.: An Analysis of DoS Attacks on Wireless LAN. In: IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET 2006), Banff, Canada (2006)Google Scholar
  13. 13.
    Ding, P., Holliday, J., Celik, A.: Improving the Security of Wireless LANs by Managing 802.1X Disassociaion. In: Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV, pp. 53–58 (2004)Google Scholar
  14. 14.
    Grech, S., Nikkanen, J.: A Security Analysis of Wi-Fi Protected Access. In: The 9th Nordic Workshop on Secure IT-systems. Helsinki University of Technology, Finland (2004)Google Scholar
  15. 15.
    Ge, W., Sampalli, S.: A Novel Scheme For Prevention of Management Frame Attacks on Wireless LANs (2005)Google Scholar
  16. 16.
    Chen, D., Deng, J., Varshney, P.K.: Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming. In: ACM MobiCom 2003, Poster, San Diego, CA, USA (2003)Google Scholar
  17. 17.
    Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In: Proceedings of 2002 MILCOM Conference, vol. 2 (2002)Google Scholar
  18. 18.
    Vladimirov, A.A., Gavrilenko, K.V., Mikhailovsky, A.A., Wi-Foo: The Secrets of Wireless Hacking, pp. 159–195. Pearson/Addison Wesley (June 2004)Google Scholar
  19. 19.
    Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the 802.1X Standard. University of Maryland, CS-TR-4328, UMIACS-TR-2002-10 (February 2002)Google Scholar
  20. 20.
    Walker, J.: Status of Project IEEE 802.11 Task Group w, Protected Management Frames (2007), http://grouper.ieee.org/groups/802/11/Reports/tgw_update.htm

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Muhammad Asif Khan
    • 1
  • Varun Jeoti
    • 1
  • Rana Shahid Manzoor
    • 1
  1. 1.Department of Electrical and Electronic EngineeringUniversiti Teknologi, PETRONASMalaysia

Personalised recommendations