SlideShare a Scribd company logo
An Alternative Approach for EnhancingAn Alternative Approach for Enhancing
Security of Wireless Networks usingSecurity of Wireless Networks using
Physical Layer EncryptionPhysical Layer Encryption
ByBy
Arpan PalArpan Pal
Center of Excellence for Embedded SystemsCenter of Excellence for Embedded Systems
Tata Consultancy ServicesTata Consultancy Services
IndiaIndia
AgendaAgenda
• Security Threats of Wireless NetworksSecurity Threats of Wireless Networks
• Proposed System OverviewProposed System Overview
• Proposed System FeaturesProposed System Features
• How the proposed system mitigate the securityHow the proposed system mitigate the security
threatsthreats
• ConclusionConclusion
Security Threats of Wireless MANSecurity Threats of Wireless MAN
• Human Initiated EventsHuman Initiated Events
• Data PrivacyData Privacy
• Data ForgeryData Forgery
• Denial of ServiceDenial of Service
• Hardware ErrorsHardware Errors
Data PrivacyData Privacy,, Data ForgeryData Forgery andand Denial of ServiceDenial of Service
are the main security events that need to be addressedare the main security events that need to be addressed
Problems of WEPProblems of WEP
The WEP encryption algorithm RC4 is a Vernam Cipher:The WEP encryption algorithm RC4 is a Vernam Cipher:
Pseudo-random
number
generator
Encryption KeyEncryption Key K
Plaintext data bytePlaintext data byte
p
Random byteRandom byte b
⊕
Ciphertext data byteCiphertext data byte
c
Decryption works the same way:Decryption works the same way: p = c ⊕ b
c’ ⊕ p = (c’) ⊕ (c ⊕ b) = b
Known Plain-text Attack: ifKnown Plain-text Attack: if p is known thenis known then b can be found outcan be found out
Source: “Overview of 802.11 Security”, Jesse Walker, Intel Corporation, IEEE 802.15-01/154, March, 2001
System Overview – Traditional SystemSystem Overview – Traditional System
Read Transmitted PHY
params info
Configure
Baseband PHY Transmitter
PHY config params
Framed and Encrypted data
from Media Access Control
(MAC) layer
Transmitter
Front-end
sent using prior-known PHY
config
PHY params info
+
Add before
actual data
Transmitter
PHY config params
Framed and Encrypted
data To Media Access
Control (MAC) layer -
Hacker can access
only at here
Receiver
Front-end
ReceiverBaseband PHY Receiver
Configure
Decode Tx PHY params info
using prior-known PHY config
System Overview – Proposed SystemSystem Overview – Proposed System
Read Transmitted PHY
params info + KEY2
Configure
Baseband PHY Transmitter
PHY Transmitter
config params
Framed data from
Media Access Control
(MAC) layer
Transmitter
Front-end
sent using prior-known
PHY config
PHY Transmitter param
info + KEY2
+
Add before
actual data
Transmitter
PHY Receiver config
params
Framed data To Media
Access Control
(MAC) layer -
Hacker can access
only at here
Receiver
Front-end
Receiver
Baseband PHY Receiver
Configure
Decode transmitted PHY
params info using prior-known
PHY config
Modifications to Tx Algorithms
based on KEY2
Encrypt with
KEY1
Modifications to Rx Algorithms
based on KEY2
Decrypt with
KEY1
Proposed System FeaturesProposed System Features
• KEY1 delivered to valid users using some secureKEY1 delivered to valid users using some secure
key distribution mechanismkey distribution mechanism
• Possible Physical layer system parameters encryptedPossible Physical layer system parameters encrypted
using KEY1using KEY1
• Error Control Coding RateError Control Coding Rate
• Type of ModulationType of Modulation
• Length of PacketLength of Packet
• Second Level Key KEY2Second Level Key KEY2
• Possible Physical layer system parameters modifiedPossible Physical layer system parameters modified
using KEY2using KEY2
• Interleaving PatternInterleaving Pattern
• Symbol Phase offsetSymbol Phase offset
• Constellation MappingConstellation Mapping
Mitigation of Security ThreatsMitigation of Security Threats
- Data Privacy- Data Privacy
• Known-Plaintext AttackKnown-Plaintext Attack
• Recording of encrypted data at MAC levelRecording of encrypted data at MAC level
• Key can be found out if Data is knownKey can be found out if Data is known
• Proposed Scheme prevents hackers from recording correctProposed Scheme prevents hackers from recording correct
encrypted data at MAC levelencrypted data at MAC level
( wrong FEC rate, wrong modulation, unknown phase( wrong FEC rate, wrong modulation, unknown phase
offset, unknown interleaving pattern etc.)offset, unknown interleaving pattern etc.)
Mitigation of Security ThreatsMitigation of Security Threats
- Data Forgery- Data Forgery
• Unauthorized users insert data into network as valid userUnauthorized users insert data into network as valid user
• ReplayReplay
• MimickingMimicking
• Proposed Scheme prevents hackers from both Replay andProposed Scheme prevents hackers from both Replay and
MimickingMimicking
• Replay is not possible as the data recorded at MAC layerReplay is not possible as the data recorded at MAC layer
is totally wrong and hence cannot be replayedis totally wrong and hence cannot be replayed
to generate a valid messageto generate a valid message
• Mimicking is not possible because this needs finding outMimicking is not possible because this needs finding out
the key first (using Known-Plain-Text attack)the key first (using Known-Plain-Text attack)
Mitigation of Security ThreatsMitigation of Security Threats
- Denial Of Service- Denial Of Service
• Intruder can flood network with valid and invalid messagesIntruder can flood network with valid and invalid messages
• Channel jamming at RF levelChannel jamming at RF level
• Proposed Scheme prevents hackers from sending validProposed Scheme prevents hackers from sending valid
messages as they don’t know the Keymessages as they don’t know the Key
• Invalid messages can be filtered out in the PHY level asInvalid messages can be filtered out in the PHY level as
the encryption is taking place in PHY layer itselfthe encryption is taking place in PHY layer itself
• Channel jamming at RF level cannot be preventedChannel jamming at RF level cannot be prevented
ConclusionConclusion
• Data Privacy, Data Forgery and Denial-of-ServiceData Privacy, Data Forgery and Denial-of-Service
(valid messages) at MAC layer (software) can be prevented(valid messages) at MAC layer (software) can be prevented
• Denial-of-Service (invalid messages) can be preventedDenial-of-Service (invalid messages) can be prevented
using PHY layer message integrity checkusing PHY layer message integrity check
• Denial-of-Service (Channel jamming at RF level)Denial-of-Service (Channel jamming at RF level)
cannot be preventedcannot be prevented
• To break into the proposed security scheme, hackers needTo break into the proposed security scheme, hackers need
costly hardware set-upcostly hardware set-up
• Even with Hardware set-up, breaking the systemEven with Hardware set-up, breaking the system
in Real-time is extremely difficult – the PHY level cipheringin Real-time is extremely difficult – the PHY level ciphering
substantially increases the entry barrier for break-insubstantially increases the entry barrier for break-in
• A good KEY distribution scheme need to be exploredA good KEY distribution scheme need to be explored
Thank YouThank You
Email:Email: arpan_pal@tcscal.co.inarpan_pal@tcscal.co.in

More Related Content

What's hot

UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
military
 
Netdefender
NetdefenderNetdefender
Netdefender
krishna Maddikara
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
P1Security
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
frcarlson
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
Gayatri Kapse
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
syedishaq
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
System ID Warehouse
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Dns protection
Dns protectionDns protection
Dns protection
Marcello Marchesini
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
primeteacher32
 
Wireless security
Wireless securityWireless security
Wireless security
vinay chitrakathi
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
Syed Ubaid Ali Jafri
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
Puneet Bawa
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20
jemtallon
 
Net Sec
Net SecNet Sec
Net Sec
backdoor
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
Ankit Anand
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
Issar Kapadia
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
SRIMCA
 

What's hot (20)

UTM (unified threat management)
UTM (unified threat management)UTM (unified threat management)
UTM (unified threat management)
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Worldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN networkWorldwide attacks on SS7/SIGTRAN network
Worldwide attacks on SS7/SIGTRAN network
 
Diameter Penetration Test Lab
Diameter Penetration Test LabDiameter Penetration Test Lab
Diameter Penetration Test Lab
 
Wireless security
Wireless securityWireless security
Wireless security
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Short blutooth present
Short blutooth present Short blutooth present
Short blutooth present
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Dns protection
Dns protectionDns protection
Dns protection
 
Wireless Attacks
Wireless AttacksWireless Attacks
Wireless Attacks
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Firewalls by Puneet Bawa
Firewalls by Puneet BawaFirewalls by Puneet Bawa
Firewalls by Puneet Bawa
 
CISSP Week 20
CISSP Week 20CISSP Week 20
CISSP Week 20
 
Net Sec
Net SecNet Sec
Net Sec
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 

Viewers also liked

Phd final
Phd finalPhd final
Core Insight Enterprise Overview
Core Insight Enterprise Overview Core Insight Enterprise Overview
Core Insight Enterprise Overview
Nsolera
 
Секретный доклад безопасности YaC 2014
Секретный доклад безопасности YaC 2014Секретный доклад безопасности YaC 2014
Секретный доклад безопасности YaC 2014
Yandex
 
Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...
Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...
Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...
Adam Przybyła
 
Muchtadi
MuchtadiMuchtadi
Creating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server HardeningCreating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server Hardening
archwisp
 
Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)
Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)
Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)
archwisp
 
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
Creating "Secure" PHP Applications, Part 1, Explicit Code & QACreating "Secure" PHP Applications, Part 1, Explicit Code & QA
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
archwisp
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
Vormetric Inc
 

Viewers also liked (9)

Phd final
Phd finalPhd final
Phd final
 
Core Insight Enterprise Overview
Core Insight Enterprise Overview Core Insight Enterprise Overview
Core Insight Enterprise Overview
 
Секретный доклад безопасности YaC 2014
Секретный доклад безопасности YaC 2014Секретный доклад безопасности YaC 2014
Секретный доклад безопасности YaC 2014
 
Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...
Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...
Koniec testowania na sposób “testerski”. Zmiana paradygmatu testowania oprogr...
 
Muchtadi
MuchtadiMuchtadi
Muchtadi
 
Creating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server HardeningCreating "Secure" PHP applications, Part 2, Server Hardening
Creating "Secure" PHP applications, Part 2, Server Hardening
 
Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)
Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)
Breaking RF Unlock Codes - Presented at TriKC 0x01 (November 2014)
 
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
Creating "Secure" PHP Applications, Part 1, Explicit Code & QACreating "Secure" PHP Applications, Part 1, Explicit Code & QA
Creating "Secure" PHP Applications, Part 1, Explicit Code & QA
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
 

Similar to Wireless security

Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
Likan Patra
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Shital Kat
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
ParasPatel967737
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
KalsoomTahir2
 
shivam sahu (firewall).pdfb jndvhjfvhjjf
shivam sahu (firewall).pdfb jndvhjfvhjjfshivam sahu (firewall).pdfb jndvhjfvhjjf
shivam sahu (firewall).pdfb jndvhjfvhjjf
sahushivam4928
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
ParvezAhmed59842
 
Bypassing nac solutions and mitigations
Bypassing nac solutions and mitigationsBypassing nac solutions and mitigations
Bypassing nac solutions and mitigations
Suraj Khetani
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
Eric Klein
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
Joe McCray
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
Sweta Leena Panda
 
Firewalls
FirewallsFirewalls
Firewalls
Akhil Sharma
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
Marrion Kujinga
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
naghamallella
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
Positive Hack Days
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
Rob Gillen
 
Security concepts
Security conceptsSecurity concepts
Security concepts
artisriva
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
Gopal Rathod
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
DefconRussia
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
qqlan
 

Similar to Wireless security (20)

Tech 101: Understanding Firewalls
Tech 101: Understanding FirewallsTech 101: Understanding Firewalls
Tech 101: Understanding Firewalls
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
shivam sahu (firewall).pdfb jndvhjfvhjjf
shivam sahu (firewall).pdfb jndvhjfvhjjfshivam sahu (firewall).pdfb jndvhjfvhjjf
shivam sahu (firewall).pdfb jndvhjfvhjjf
 
ML13198A410.pdf
ML13198A410.pdfML13198A410.pdf
ML13198A410.pdf
 
Bypassing nac solutions and mitigations
Bypassing nac solutions and mitigationsBypassing nac solutions and mitigations
Bypassing nac solutions and mitigations
 
VoIP Security 101 what you need to know
VoIP Security 101   what you need to knowVoIP Security 101   what you need to know
VoIP Security 101 what you need to know
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Firewalls
FirewallsFirewalls
Firewalls
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 

More from Arpan Pal

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpal
Arpan Pal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4
Arpan Pal
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
Arpan Pal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gws
Arpan Pal
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
Arpan Pal
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
Arpan Pal
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012
Arpan Pal
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccs
Arpan Pal
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012
Arpan Pal
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
Arpan Pal
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013
Arpan Pal
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besu
Arpan Pal
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
Arpan Pal
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocr
Arpan Pal
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epg
Arpan Pal
 
Embedded
EmbeddedEmbedded
Embedded
Arpan Pal
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsr
Arpan Pal
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallenges
Arpan Pal
 
Generic mac
Generic macGeneric mac
Generic mac
Arpan Pal
 
Heig tcs
Heig tcsHeig tcs
Heig tcs
Arpan Pal
 

More from Arpan Pal (20)

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gws
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccs
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besu
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocr
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epg
 
Embedded
EmbeddedEmbedded
Embedded
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsr
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallenges
 
Generic mac
Generic macGeneric mac
Generic mac
 
Heig tcs
Heig tcsHeig tcs
Heig tcs
 

Wireless security

  • 1. An Alternative Approach for EnhancingAn Alternative Approach for Enhancing Security of Wireless Networks usingSecurity of Wireless Networks using Physical Layer EncryptionPhysical Layer Encryption ByBy Arpan PalArpan Pal Center of Excellence for Embedded SystemsCenter of Excellence for Embedded Systems Tata Consultancy ServicesTata Consultancy Services IndiaIndia
  • 2. AgendaAgenda • Security Threats of Wireless NetworksSecurity Threats of Wireless Networks • Proposed System OverviewProposed System Overview • Proposed System FeaturesProposed System Features • How the proposed system mitigate the securityHow the proposed system mitigate the security threatsthreats • ConclusionConclusion
  • 3. Security Threats of Wireless MANSecurity Threats of Wireless MAN • Human Initiated EventsHuman Initiated Events • Data PrivacyData Privacy • Data ForgeryData Forgery • Denial of ServiceDenial of Service • Hardware ErrorsHardware Errors Data PrivacyData Privacy,, Data ForgeryData Forgery andand Denial of ServiceDenial of Service are the main security events that need to be addressedare the main security events that need to be addressed
  • 4. Problems of WEPProblems of WEP The WEP encryption algorithm RC4 is a Vernam Cipher:The WEP encryption algorithm RC4 is a Vernam Cipher: Pseudo-random number generator Encryption KeyEncryption Key K Plaintext data bytePlaintext data byte p Random byteRandom byte b ⊕ Ciphertext data byteCiphertext data byte c Decryption works the same way:Decryption works the same way: p = c ⊕ b c’ ⊕ p = (c’) ⊕ (c ⊕ b) = b Known Plain-text Attack: ifKnown Plain-text Attack: if p is known thenis known then b can be found outcan be found out Source: “Overview of 802.11 Security”, Jesse Walker, Intel Corporation, IEEE 802.15-01/154, March, 2001
  • 5. System Overview – Traditional SystemSystem Overview – Traditional System Read Transmitted PHY params info Configure Baseband PHY Transmitter PHY config params Framed and Encrypted data from Media Access Control (MAC) layer Transmitter Front-end sent using prior-known PHY config PHY params info + Add before actual data Transmitter PHY config params Framed and Encrypted data To Media Access Control (MAC) layer - Hacker can access only at here Receiver Front-end ReceiverBaseband PHY Receiver Configure Decode Tx PHY params info using prior-known PHY config
  • 6. System Overview – Proposed SystemSystem Overview – Proposed System Read Transmitted PHY params info + KEY2 Configure Baseband PHY Transmitter PHY Transmitter config params Framed data from Media Access Control (MAC) layer Transmitter Front-end sent using prior-known PHY config PHY Transmitter param info + KEY2 + Add before actual data Transmitter PHY Receiver config params Framed data To Media Access Control (MAC) layer - Hacker can access only at here Receiver Front-end Receiver Baseband PHY Receiver Configure Decode transmitted PHY params info using prior-known PHY config Modifications to Tx Algorithms based on KEY2 Encrypt with KEY1 Modifications to Rx Algorithms based on KEY2 Decrypt with KEY1
  • 7. Proposed System FeaturesProposed System Features • KEY1 delivered to valid users using some secureKEY1 delivered to valid users using some secure key distribution mechanismkey distribution mechanism • Possible Physical layer system parameters encryptedPossible Physical layer system parameters encrypted using KEY1using KEY1 • Error Control Coding RateError Control Coding Rate • Type of ModulationType of Modulation • Length of PacketLength of Packet • Second Level Key KEY2Second Level Key KEY2 • Possible Physical layer system parameters modifiedPossible Physical layer system parameters modified using KEY2using KEY2 • Interleaving PatternInterleaving Pattern • Symbol Phase offsetSymbol Phase offset • Constellation MappingConstellation Mapping
  • 8. Mitigation of Security ThreatsMitigation of Security Threats - Data Privacy- Data Privacy • Known-Plaintext AttackKnown-Plaintext Attack • Recording of encrypted data at MAC levelRecording of encrypted data at MAC level • Key can be found out if Data is knownKey can be found out if Data is known • Proposed Scheme prevents hackers from recording correctProposed Scheme prevents hackers from recording correct encrypted data at MAC levelencrypted data at MAC level ( wrong FEC rate, wrong modulation, unknown phase( wrong FEC rate, wrong modulation, unknown phase offset, unknown interleaving pattern etc.)offset, unknown interleaving pattern etc.)
  • 9. Mitigation of Security ThreatsMitigation of Security Threats - Data Forgery- Data Forgery • Unauthorized users insert data into network as valid userUnauthorized users insert data into network as valid user • ReplayReplay • MimickingMimicking • Proposed Scheme prevents hackers from both Replay andProposed Scheme prevents hackers from both Replay and MimickingMimicking • Replay is not possible as the data recorded at MAC layerReplay is not possible as the data recorded at MAC layer is totally wrong and hence cannot be replayedis totally wrong and hence cannot be replayed to generate a valid messageto generate a valid message • Mimicking is not possible because this needs finding outMimicking is not possible because this needs finding out the key first (using Known-Plain-Text attack)the key first (using Known-Plain-Text attack)
  • 10. Mitigation of Security ThreatsMitigation of Security Threats - Denial Of Service- Denial Of Service • Intruder can flood network with valid and invalid messagesIntruder can flood network with valid and invalid messages • Channel jamming at RF levelChannel jamming at RF level • Proposed Scheme prevents hackers from sending validProposed Scheme prevents hackers from sending valid messages as they don’t know the Keymessages as they don’t know the Key • Invalid messages can be filtered out in the PHY level asInvalid messages can be filtered out in the PHY level as the encryption is taking place in PHY layer itselfthe encryption is taking place in PHY layer itself • Channel jamming at RF level cannot be preventedChannel jamming at RF level cannot be prevented
  • 11. ConclusionConclusion • Data Privacy, Data Forgery and Denial-of-ServiceData Privacy, Data Forgery and Denial-of-Service (valid messages) at MAC layer (software) can be prevented(valid messages) at MAC layer (software) can be prevented • Denial-of-Service (invalid messages) can be preventedDenial-of-Service (invalid messages) can be prevented using PHY layer message integrity checkusing PHY layer message integrity check • Denial-of-Service (Channel jamming at RF level)Denial-of-Service (Channel jamming at RF level) cannot be preventedcannot be prevented • To break into the proposed security scheme, hackers needTo break into the proposed security scheme, hackers need costly hardware set-upcostly hardware set-up • Even with Hardware set-up, breaking the systemEven with Hardware set-up, breaking the system in Real-time is extremely difficult – the PHY level cipheringin Real-time is extremely difficult – the PHY level ciphering substantially increases the entry barrier for break-insubstantially increases the entry barrier for break-in • A good KEY distribution scheme need to be exploredA good KEY distribution scheme need to be explored
  • 12. Thank YouThank You Email:Email: arpan_pal@tcscal.co.inarpan_pal@tcscal.co.in