Layer One challenge Biró László Miklós HA5YAR

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Safecom INGRESS GATE technology (Patent p)
Determining and Characterizing the Number of Frequency Hopping Interferers using Time and Frequency Offset Estimation Alican Gök Prof. Danijela Cabric.
Hidden Terminal Problem and Exposed Terminal Problem in Wireless MAC Protocols.
IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
Denial of Service in Sensor Networks Szymon Olesiak.
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
How is Information Transferred? Developing an Intuition for Network Communication Protocols a 6.UAT concept talk by Olga Stroilova.
Wireless Computer Networking Melanie Hanson May 6, 2002.
FHSS vs. DSSS Presented by Ali Alhajhouj. Presentation Outline Introduce the issues involved in the system behaviors for FHSS and DSSS systems used in.
Wireless networking technology By Abbas Izadpanah January 2007.
Overview.  UMTS (Universal Mobile Telecommunication System) the third generation mobile communication systems.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
1 CMPT 371 Data Communications and Networking Spread Spectrum.
Wireless & Mobile Networking: Multiple Division Techniques
Modulation is the process of conveying a message signal, for example a digital bit stream or an analog audio signal, inside another signal that can be.
Advanced Radio and Radar
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Modulation Coding and Multiplexing Radio Frequency Signals Last Update Copyright Kenneth M. Chipps Ph.D. 1.
 Defining the RF jamming system and showing the importance and need of using it in many places.  Giving a complete RF jamming system design based on.
 fiber optics cable and free space optics (FSO). Like fiber optics cable, FSO uses lasers to transmit data, but instead of enclosing the data stream.
1 Computer Maintenance Mobile Devices: How they Operate Copyright © Texas Education Agency, All rights reserved.
An introduction to  Interviewing  Presenting  Recording  Editing.
Copyright AvaLAN Wireless 2011 Installing AvaLAN Wireless Ethernet Systems Presented by Michael Derby AvaLAN Wireless Systems.
7.1 Chapter 7 Transmission Media Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
COMMUNICATION SYSTEM (2) CT1401 LECTURE-9 : MOBILE PHONE BY : AFNAN ALAYYASH SUPERVISION : DR.OUIEM BCHIR.
Local Area Networks Chapter 17, Exploring the Digital Domain.
Cellular Mobile Communication Systems Lecture 5
Signal Propagation Propagation: How the Signal are spreading from the receiver to sender. Transmitted to the Receiver in the spherical shape. sender When.

Software Defined Radio
Computer Architecture Lecture 30 Fasih ur Rehman.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Introduction to Network (c) Nouf Aljaffan
Presented by Hampton Smith  An IEEE (Institute for Electrical and Electronics Engineers) protocol ratified in 1997 which defines a standard.
Spread Spectrum Spread-spectrum techniques are methods by which energy generated in a particular bandwidth is deliberately spread in the frequency domain,
CDMA Code Division Multiple Access. is a channel access method
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Wireless Security System Group #14 Yuncheng Wang Chris Overcash John Petty Chun Hong Lin.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 11 Cellular and PCS Systems Dr. Stewart D. Personick Drexel.
CDMA TECHNOLOGY DEFINITION OF CDMA TECHNOLOGY A coding scheme, used as a modulation technique, in which multiple channels are independently coded for.
1. Physical Transmission Transmission Media Wire (guided) Coaxial cable Twisted Pair UTP STP Fiber Optic Wireless (unguided) Radio waves Microwave Infrared.
Agenda Last class: Network Protocols Today: Wireless Technology –How do computers talk to each other… with no wire connecting them?
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Systems Lecture no. 1. Introduction  The world is revolutionized by the advancements that have taken place in various fields.  Examples of.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Telephone and Telecommunication. Telephone - a device for transmitting and receiving sound at a distance. Modern phones are performed through the transmission.
EC 2401*** WIRELESS COMMUNICATION. Why Wireless Benefits – Mobility: Ability to communicate anywhere!! – Easier configuration, set up and lower installation.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
By. Jadhav Avinash J Roll no - 2K13E11. Reference: Hewlett Packard Agilent Technology Wikipedia GwINSTEK.
 Abbreviation of fourth generation wireless technology  It will provide a comprehensive IP solution where voice, data and multimedia can be given to.
Ultra-Wideband - John Burnette -.
Spread Spectrum L.Tahani Aljehani.
Physical Transmission
Spread Spectrum Multiplexing combines signals from several sources to achieve bandwidth efficiency: The available bandwidth of a link is divided between.
Electromagnetic Spectrum
Tri-Band RF Jamming System
INVISIBLE I am here today to talk about something invisible – radiowaves. Radiowaves are a resource that everyone here uses. You use them every day when.
Denial-of-Service Jammer Detector Training Course Worldsensing
Transmitters Advanced Course requires a detailed knowledge of Transmitters and Receivers This session covers Transmitter Block Diagrams, Oscillators and.
Cellular Telephone Networks
Security in SDR & cognitive radio
Presentation transcript:

Layer One challenge Biró László Miklós HA5YAR

The well-known OSI layers... When we are talking about protecting our network almost everybody think about Layer 2-3 or 4 But what about Layer 1?

What type of media can we use? Copper, optical fiber are not dangerous. The line tapping can easily be detected. Wireless part is an other story

Local wifi? Not a big deal... Eavesdropping is easy and traceless... But almost useless...

Let's see something more interesting...

...or this one?... Non of participants would be happy if you could capture this communication...

Wireless layer one - cannot be encrypted - cannot be protected - eavesdropping cannot be detected - eavesdropping cannot be prevented … but you can try to make the eavesdropping difficult...

Traditional two-way radio communication You only have to set the appropriate frequency and push (then release) the button...

Digital radio communication - Integrated voice- and data transfer - Encrypted digital content - Multiple communication frequencies - Quasi-random and rapid frequency changes (“hopping”)

What is the “frequency hopping”? (aka spread-spectrum communication) Conventional receiver cannot read it!

How does it work?

If you want to recover the message: - You have to capture all of transmitted packages - You have to concatenate them in the appropriate sequence - Then, you have to break the encryption It's really easy if you know the frequency generating algorithm. Otherwise the life is hard... A commercial “hopping table” contains 17 frequencies with about 1 MHz spacing.

Do you have a frequency- hopping device in your pocket? I was pretty sure you did... How can it work?

What type of receiver can be used? We will need a so-called software defined radio. That receiver is able to “see” together significant part of RF spectrum. It's like the good old “panoramic receivers” but SDRs can read several frequencies simultaneously

This is a professional SDR and I will use this nice receiver for the demonstration.

Let's check my mobile phone! It's a very simple dual band GSM phone and now I will turn it on: What's happened?

Next step: continuous communication with the tower

Let’s have a closer look! Power envelope shows the spreaded use of the band.

More closer!

Even more closer… The bursts between the principal frequencies came from the distortion of the power stage of the transmitter!

Every moving dot is a data package! Waterfall diagram

Why frequency hopping is useful? In wireless communication: - Protected against jamming - Protected against QRM - Hard to capture the conversation - Conversation can be hidden into the backgroud noise. - convetional receivers cannot read it

Why frequency hopping is useful? In (military) radar application: If the radar station randomly changes its frequency - hard to detect the target tracking mode - hard to find the location of the radar station Search/Tracking

How can we disguise the tracking mode? If the frequency of the beam randomly changes the aircraft will not consider it a tracking beam!

How capture we read the spread- spectrum conversation? We need SDR receiver. The problem with the Rohde & Schwarz receiver shown above is the price tag: euros… Could we use something less expensive?

Those SDRs are between 10 and 50 $. The problem is the speed and the sampling resolution

If I want to capture and concatenate the transmitted blocks I must be able to recognize what blocks come from the same transmitter. Major (identifying) peculiarities of any transmitter: - harmonic content of the first some ten waves - envelope of the first some ten waves

Harmonic content: can be determined by FFT A Hungarian name who added a lot to this technique: Dr. Székely Vladimir

Shape of the envelope

Why the first some ten waves? Neither the harmonic content nor the envelope shape can be forged! Those are the fingerprints of the radio/radar transmitter!!!

What a surprize! The name of this technique is Transmitter fingerprinting!

We only have to… - Inspect every single newly active frequencies - Calculate their harmonic contents and levels - Digitize and store the envelope shape - Store the whole staff in a „peculiarity table” If the harmonic levels and the envelope shapes are the same in two line, the transmission comes from the same source/transmitter

Calculation takes time… How much time do we have? Let’s see: - one full hop is 1/3200 sec = 311 usec - dwell time can be about 250 usec - if the frequency is 300 MHz the first 20 waves take 70 nsec During this 7 nsec we should be able to calculate everything! It is impossible!!!

If only we could use the whole dwell time (250 usec)… Delay line: -if you gain time, you gain information

How it works?

Running through the delay line neither the harmonic content nor the envelope of the signal changes!

How can I use it?

An advanced version:

Feel free to try it, feel free to use it, but don”t forget; this is a copyrighted method and I prefer the black beer…

Qestions? HA5YAR on 80 m CW

Thank you for your attention…