Demo: iJam with Channel Randomization

07/07/2020
by   Jordan L. Melcher, et al.
0

Physical-layer key generation methods utilize the variations of the communication channel to achieve a secure key agreement between two parties with no prior security association. Their secrecy rate (bit generation rate) depends heavily on the randomness of the channel, which may reduce significantly in a stable environment. Existing methods seek to improve the secrecy rate by injecting artificial noise into the channel. Unfortunately, noise injection cannot alter the underlying channel state, which depends on the multipath environment between the transmitter and receiver. Consequently, these methods are known to leak key bits toward multi-antenna eavesdroppers, which is capable of filtering the noise through the differential of multiple signal receptions. This work demonstrates an improved approach to reinforce physical-layer key generation schemes, e.g., channel randomization. The channel randomization approach leverages a reconfigurable antenna to rapidly change the channel state during transmission, and an angle-of-departure (AoD) based channel estimation algorithm to cancel the changing effects for the intended receiver. The combined result is a communication channel stable in the eyes of the intended receiver but randomly changing from the viewpoint of the eavesdropper. We augmented an existing physical-layer key generation protocol, iJam, with the proposed approach and developed a full-fledged remote instrumentation platform to demonstrate its performance. Our evaluations show that augmentation does not affect the bit error rate (BER) of the intended receiver during key establishment but reduces the eavesdropper's BER to the level of random guessing, regardless of the number of antennas it equips.

READ FULL TEXT
research
02/18/2020

ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization

Orthogonal blinding based schemes for wireless physical layer security a...
research
12/03/2018

ORACLE: Optimized Radio clAssification through Convolutional neuraL nEtworks

This paper describes the architecture and performance of ORACLE, an appr...
research
06/04/2021

Man-in-the-Middle Attack Resistant Secret Key Generation via Channel Randomization

Physical-layer based key generation schemes exploit the channel reciproc...
research
01/13/2018

Channel Whispering: a Protocol for Physical Layer Group Key Generation. Application to IR-UWB through Deconvolution

As wireless ad hoc and mobile networks are emerging and the transferred ...
research
03/18/2018

Covert Communications Versus Physical Layer Security

This letter studies and compares the physical-layer security approach an...
research
03/06/2018

Optimal Grassmann Manifold Eavesdropping: A Huge Security Disaster for M-1-2 Wiretap Channels

We in this paper introduce an advanced eavesdropper that aims to paralyz...
research
07/31/2022

Electromagnetic Signal Injection Attacks on Differential Signaling

Differential signaling is a method of data transmission that uses two co...

Please sign up or login with your details

Forgot password? Click here to reset