Zhenghao Zhang and Avishek Mukherjee Computer Science Department

Slides:



Advertisements
Similar presentations
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Advertisements

Error Control Code.
The Impact of Channel Estimation Errors on Space-Time Block Codes Presentation for Virginia Tech Symposium on Wireless Personal Communications M. C. Valenti.
Enhancing Secrecy With Channel Knowledge
Physical Layer Security Made Fast and Channel-Independent Shyamnath Gollakota Dina Katabi.
MIMO As a First-Class Citizen in Kate C.-J. Lin Academia Sinica Shyamnath Gollakota and Dina Katabi MIT.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
Noise Cancelation for MIMO System Prepared by: Heba Hamad Rawia Zaid Rua Zaid Supervisor: Dr.Yousef Dama.
1 Introduction to Communications Professor R. C. T. Lee Dept. of Information Management Dept. of Computer Science Department of Communications Department.
ENGR How do multiple users “share” the airwaves? Multiple Access (MA) techniques: –Time Division MA (TDMA) –Frequency Division MA (FDMA) –Code Division.
Can we get Wi-Fi connectivity for 15 µW? Bryce Kellogg.
1 Lecture 9: Diversity Chapter 7 – Equalization, Diversity, and Coding.
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley AISP Workshop May 2, 2007 Joint.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Multiple Input Multiple Output
Improvements in throughput in n The design goal of the n is “HT” for High Throughput. The throughput is high indeed: up to 600 Mbps in raw.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
TurfCast: A Service for Controlling Information Dissemination in Wireless Networks Xinfeng Li, Jin Teng, Boying Zhang, Adam Champion and Dong Xuan IEEE.
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
Error Coding Transmission process may introduce errors into a message.  Single bit errors versus burst errors Detection:  Requires a convention that.
On Distinguishing the Multiple Radio Paths in RSS-based Ranging Dian Zhang, Yunhuai Liu, Xiaonan Guo, Min Gao and Lionel M. Ni College of Software, Shenzhen.
MIMO continued and Error Correction Code. 2 by 2 MIMO Now consider we have two transmitting antennas and two receiving antennas. A simple scheme called.
TELECOMMUNICATIONS Dr. Hugh Blanton ENTC 4307/ENTC 5307.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
The Principle of Electronic Data Serial and Parallel Data Communication Transmission Rate Bandwidth Bit Rate Parity bits.
Multiple Antennas Have a Big Multi- User Advantage in Wireless Communications Bertrand Hochwald (Bell Labs)
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
Space Time Codes. 2 Attenuation in Wireless Channels Path loss: Signals attenuate due to distance Shadowing loss : absorption of radio waves by scattering.
Lecture Focus: Data Communications and Networking  Transmission Impairment Lecture 14 CSCS 311.
Review. Layers Physical layer – sending bits from one place to another, ensuring an okay BER Data link layer – encapsulate information bits into frames,
Encoding How is information represented?. Way of looking at techniques Data Medium Digital Analog Digital Analog NRZ Manchester Differential Manchester.
MIMO: Challenges and Opportunities Lili Qiu UT Austin New Directions for Mobile System Design Mini-Workshop.
McGraw-Hill©2003 The McGraw-Hill Companies, Inc. Chapter 6 Physical Layer.
Accurate WiFi Packet Delivery Rate Estimation and Applications Owais Khan and Lili Qiu. The University of Texas at Austin 1 Infocom 2016, San Francisco.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
FUNCTION GENERATOR.
 First generation systems utilized frequency axis to separate users into different channels  Second generation systems added time axis to increase number.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
LAN, WAN, and Network Topologies
Featrues of Compputer Networks
244-6: Higher Generation Wireless Techniques and Networks
Xin Liu Department of Computer Science Univ. of California, Davis
Port Knocking Benjamin DiYanni.
Jamming for good: a fresh approach to authentic communication in WSNs
Chapter Two Fundamentals of Data and Signals
Wireless Technologies
Space Time Codes.
NVR Recording and Network Considerations
Topics discussed in this section:
Stateful Inter-Packet Signal Processing for Wireless Networking
Text proposal for using receiver information
4.1 Chapter 4 Digital Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Understanding the OSI Reference Model
Chapter 8 Network Basics.
MIMO II: Physical Channel Modeling, Spatial Multiplexing
MIMO-OFDM with antenna selection
mEEC: A Novel Error Estimation Code with Multi-Dimensional Feature
Error Detection Neil Tang 9/26/2008
Follow-Up on WUR Discovery Frame and Discovery Channel
Text proposal for using receiver information
Text proposal for using receiver information
MIMO (Multiple Input Multiple Output)
Multiple Antenna OFDM solutions for enhanced PHY
Text proposal for using receiver information
MIMO I: Spatial Diversity
MIMO II: Physical Channel Modeling, Spatial Multiplexing
Presentation transcript:

Friendly Channel-Oblivious Jamming with Error Amplification for Wireless Networks Zhenghao Zhang and Avishek Mukherjee Computer Science Department Florida State University Tallahassee, FL 32306, USA

Wi-Fi is widely used homes offices public hot spots, e.g., coffee shops, air ports, college campus How many people go to starbucks just to use Wi-Fi

Security of Wi-Fi Signal is sent in the open air, everyone nearby can overhear Password can solve the problem, however not in open networks The problem we are interested in: how to prevent an eavesdropper from being able to decode the packet without password protection, while ensuring the legitimate user can get the packet correctly

General Approach Jammer Introducing a jammer with multiple antennas Legitimate user Eavesdropper Introducing a jammer with multiple antennas When the sender transmits a packet, the jammer transmits jamming signal simultaneously, but the jamming signal is generated such that it is 0 at the legitimate user but most likely non-zero elsewhere Sender Jammer

General Approach Jammer How this is achieved, roughly speaking: Opposite phase, cancel Same phase, add up Legitimate user Eavesdropper How this is achieved, roughly speaking: The jamming signal is a sine wave One sine wave on each antenna The jammer supposedly know the phase lag to the legitimate user, and adjusts the phases of sine waves such that it cancels at the legitimate user, but most likely not at other locations [STROBE, Infocom 2012] Sender Jammer

Challenges – (1) Legitimate user Eavesdropper The jamming signal power at any time is not going to cover the entire area, just leaving a hole near the legitimate user It may happen that the sine waves also have opposite phases at a different eavesdropper Cannot control really because the eavesdropper may be at any location with any phase lag Not jammed Jammer

Challenges – (2) Even when jammed, if the data packet is modulated at a low data rate, with strong error correction code, not going to have a lot of errors! Results collected with Microsoft Sora when the jamming signal is generated according to STROBE The eavesdropper still can get MOST bits right!

Our Contribution – (1) AAAAAAAA AAAAAAAA Data Data Proposes to employ an error amplifier that can turn just a few errors into many errors Before sending the data, map it to another string according to a random permutation After receiving, map the received string according to the reverse of the random permutation BBBBBBBB BBBBBBBB Mapped Mapped BBBBBBBB BBBB3BBB Received Received Reverse Map Reverse Map AAAAAAAA 89EF2DF1

Error Amplifier Can use AES to implement the error amplifier

Error Amplifier The argument is that will have to do this anyway because jamming only cannot turn enough data bits into errors The catch is that both sender and the legitimate user would have to install the error amplifier

Our Contribution – (2) jMax: a jamming strategy that exploits the error amplifier to more effectively protect user privacy by maximizing the maximum jamming power to any eavesdropper, without knowing the phase lags (CSI, to be exact) of any eavesdropper

jMax The error amplifier is going to just need a few error bits, so the jamming power to any potential eavesdropper need not be constant high power, which is hard to achieve, instead can be just a spike

jMax Legitimate user Eavesdropper Not knowing the phase lags (CSI) to the eavesdroppers, will just try multiple sets of phase adjustments (jamming vector), each time will cover some areas and leave some holes, but any eavesdropper will unlikely to be in the holes every time Jammer

jMax Current design uses 10 jamming vectors, where Λ1 and Λ2 are the orthogonal base of the space orthogonal to the legitimate user’s CSI Theorem: The maximum jamming power jMax introduces to any eavesdropper at least of the optimal jamming power.

jMax Intuition: Any valid jamming vector (the vector to determine the phase and amplitude of the sine waves from each antenna) has to be a linear combination of Λ1 and Λ2 The selected jamming vectors are in some sense evenly distributed in the linear space spanned by Λ1 and Λ2 and therefore not too far from any vector in this space

jMax – Practical Considerations For OFDM systems, basically use the same procedure for each subcarrier One concern is that as different subcarriers have different CSI, their peak power may not be arrived at the same time

jMax – Practical Considerations Fortunately, the CSIs of different subcarriers show a lot of correlation The right is two typical cases of received jamming powers at different subcarriers for the 10 jamming vectors CSI collected with the Intel 5300 wireless card

Evaluations Used the Intel 5300 wireless card with 3 tx and rx antennas to collect the CSI as the CSI a jammer to the user and multiple eavesdroppers

Evaluations Used Microsoft Sora to transmit packets at all 802.11a data rates (6,9,12,18,24,36,48,54 Mbps) at 3 packet sizes (80, 320, 960 bytes), and recorded the waveform in the air Our Sora machine has only one antenna, so we assume the sender, user, eavesdroppers all have one antenna

Evaluation We assume the jammer has 3 antennas, and generate the jamming signal according to jMax jamming vectors, then add the jamming signal to the packet waveform in software, then run the Sora offline decoder

Compared Method 2-ANT: uses only two antennas, cannot change jamming vectors STROBE: uses all antennas, multiplies either 1 or -1 randomly with Λ1 and Λ2 uses the sum Optimal: uses all antennas, knows the CSI to the eavesdropper

Performance JSR: tx power of jammer to the tx power of the sender ratio 8 bit errors means a successful jam Solid gains over STROBE and 2-ANT JSR needs to be quite large for low data rates and lower for higher data rates The curve has a large transition range, meaning that some are easy to jam and others more difficult

Jamming Failure Ratios A jamming method may fail to jam certain client and eavesdropper pairs even when the jamming power the largest value we take in the evaluation jMax is much lower than Strobe and 2-Ant The gain of 3-antenna methods over 2-Ant suggests that more antennas will further reduce the failure ratio

Jam Power Ratio Find the maximum power ratio of various methods over Optimal The ratio of jMax roughly matches the theoretical bound

Thank you!