Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems.

Similar presentations


Presentation on theme: "An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems."— Presentation transcript:

1 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems Tata Consultancy Services India IEEE C802.20-03/88

2 Agenda Security Threats of Wireless MAN Security Threats of Wireless MAN Proposed System Overview Proposed System Overview Proposed System Features Proposed System Features How the proposed system mitigate the security How the proposed system mitigate the security threats threats Conclusion Conclusion

3 Security Threats of Wireless MAN Human Initiated Events Human Initiated Events Data Privacy Data Privacy Data Forgery Data Forgery Denial of Service Denial of Service Hardware Errors Hardware Errors Data Privacy, Data Forgery and Denial of Service are the main security events that need to be addressed Ref:- Alan Chickinsky, Wireless Security Threats, IEEE C802.20-03/06, January 2003 IEEE C802.20-03/06, January 2003

4 System Overview – Traditional System Read Transmitted PHY params info Configure Baseband PHY Transmitter PHY config params Framed data from Media Access Control (MAC) layer Transmitter Front-end sent using prior-known PHY config PHY params info + Add before actual data Transmitter PHY config params Framed data To Media Access Control (MAC) layer - Hacker can access only at here Receiver Front-end Receiver Baseband PHY Receiver Configure Decode Tx PHY params info using prior-known PHY config

5 System Overview – Proposed System Read Transmitted PHY params info + KEY2 Configure Baseband PHY Transmitter PHY Transmitter config params Framed data from Media Access Control (MAC) layer Transmitter Front-end sent using prior-known PHY config PHY Transmitter param info + KEY2 + Add before actual data Transmitter PHY Receiver config params Framed data To Media Access Control (MAC) layer - Hacker can access only at here Receiver Front-end Receiver Baseband PHY Receiver Configure Decode transmitted PHY params info using prior-known PHY config Modifications to Tx Algorithms based on KEY2 Encrypt with KEY1 Modifications to Rx Algorithms based on KEY2 Decrypt with KEY1

6 Proposed System Features KEY1 delivered to valid users using some secure KEY1 delivered to valid users using some secure key distribution mechanism key distribution mechanism Possible Physical layer system parameters encrypted Possible Physical layer system parameters encrypted using KEY1 using KEY1 Error Control Coding Rate Error Control Coding Rate Type of Modulation Type of Modulation Length of Packet Length of Packet Second Level Key KEY2 Second Level Key KEY2 Possible Physical layer system parameters modified Possible Physical layer system parameters modified using KEY2 using KEY2 Interleaving Pattern Interleaving Pattern Phase offset of OFDM symbols Phase offset of OFDM symbols Constellation Mapping Constellation Mapping

7 Proposed System - Example KEY2 can be varied from packet to packet KEY2 can be varied from packet to packet One may modify using random numbers seeded by KEY2 One may modify using random numbers seeded by KEY2 Phase offset of OFDM symbols at IFFT input Phase offset of OFDM symbols at IFFT input Note:- Phases of only data points (excluding pilots and zero padding) should be altered Error Control Coding Rate Modulation Type Packet Length KEY2 XOR Random No. Generator Encrypted Output KEY1

8 Proposed System – Application to 802.20 Physical Layer of 802.20 is evolving Physical Layer of 802.20 is evolving OFDM could be an integral part of PHY given the OFDM could be an integral part of PHY given the operational scenario operational scenario The proposed scheme can easily be adapted The proposed scheme can easily be adapted to the 802.20 OFDM PHY to the 802.20 OFDM PHY The proposed scheme is not limited to OFDM PHY only The proposed scheme is not limited to OFDM PHY only

9 Mitigation of Security Threats - Data Privacy Known-Plaintext Attack Known-Plaintext Attack Recording of encrypted data at MAC level Recording of encrypted data at MAC level Key can be found out if Data is known Key can be found out if Data is known Proposed Scheme prevents hackers from recording correct Proposed Scheme prevents hackers from recording correct encrypted data at MAC level encrypted data at MAC level ( wrong FEC rate, wrong modulation, unknown phase offset, unknown interleaving pattern etc.) offset, unknown interleaving pattern etc.)

10 Mitigation of Security Threats - Data Forgery Unauthorized users insert data into network as valid user Unauthorized users insert data into network as valid user Replay Replay Mimicking Mimicking Proposed Scheme prevents hackers from both Replay and Proposed Scheme prevents hackers from both Replay and Mimicking Mimicking Replay is not possible as the data recorded at MAC layer Replay is not possible as the data recorded at MAC layer is totally wrong and hence cannot be replayed is totally wrong and hence cannot be replayed to generate a valid message to generate a valid message Mimicking is not possible because this needs finding out Mimicking is not possible because this needs finding out the key first (using Known-Plain-Text attack) the key first (using Known-Plain-Text attack)

11 Mitigation of Security Threats - Denial Of Service Intruder can flood network with valid and invalid messages Intruder can flood network with valid and invalid messages Channel jamming at RF level Channel jamming at RF level Proposed Scheme prevents hackers from sending valid Proposed Scheme prevents hackers from sending valid messages as they dont know the Key messages as they dont know the Key Invalid messages can be filtered out in the PHY level as Invalid messages can be filtered out in the PHY level as the encryption is taking place in PHY layer itself the encryption is taking place in PHY layer itself Channel jamming at RF level cannot be prevented Channel jamming at RF level cannot be prevented

12 Conclusion Data Privacy, Data Forgery and Denial-of-Service Data Privacy, Data Forgery and Denial-of-Service (valid messages) at MAC layer (software) can be prevented (valid messages) at MAC layer (software) can be prevented Denial-of-Service (invalid messages) can be prevented Denial-of-Service (invalid messages) can be prevented using PHY layer message integrity check using PHY layer message integrity check Denial-of-Service (Channel jamming at RF level) Denial-of-Service (Channel jamming at RF level) cannot be prevented cannot be prevented To break into the proposed security scheme, hackers need To break into the proposed security scheme, hackers need costly hardware set-up costly hardware set-up Even with Hardware set-up, breaking the system Even with Hardware set-up, breaking the system in Real-time is extremely difficult – the PHY level ciphering in Real-time is extremely difficult – the PHY level ciphering substantially increases the entry barrier for break-in substantially increases the entry barrier for break-in A good KEY distribution scheme need to be explored A good KEY distribution scheme need to be explored

13 Thank You Email: arpan_pal@tcscal.co.in Email: arpan_pal@tcscal.co.in


Download ppt "An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption By Arpan Pal Wireless Group Center of Excellence for Embedded Systems."

Similar presentations


Ads by Google