SlideShare a Scribd company logo
1 of 17
1
Enhancement of Security of WirelessEnhancement of Security of Wireless
Networks using Physical Layer ProtectionNetworks using Physical Layer Protection
Arpan PalArpan Pal 11
, Srinivasa Rao Ch., Srinivasa Rao Ch. 11
, Suvra Sekhar Das, Suvra Sekhar Das 22
, Balamuralidhar P., Balamuralidhar P. 11
,,
Harish ReddyHarish Reddy 11
1
Embedded Systems Group, Tata Consultancy Services Ltd., India
2
Embedded Systems Group, Tata Consultancy Services Ltd., India
and
Center for TeleInFrastruktur (CTiF), Aalborg University, Denmark
2
AgendaAgenda
 Conventional Encryption Systems
 Proposed System
 Communication System Performance Requirement
 Hacking Complexity
 Simulation Study
 Future Work
 Conclusion
 References
3
Stream CiphersStream Ciphers
Conventional Encryption SystemsConventional Encryption Systems
Block CiphersBlock Ciphers
Examples
RC4, A5
Advantages
 Relatively Less Complex (LFSR
based implementation) and hence
faster implementation
 Normally Consumes less area
and power – important for
handheld devices
Disadvantages
 mostly uses Vernam ciphers
− easy for known-plain text attack,
substitution attack, key-reuse
attack
Examples
DES, 3DES, AES
Advantages
 Highly Secure (for block sizes >
64 and key lengths > 80)
Disadvantages
 Padding inefficiency if input data
is less than the block length
 Relatively Complex and hence
CPU-intensive implementation
 Consumes large area and power
– bottleneck for handheld devices
Block Ciphers, in general provideBlock Ciphers, in general provide
greater security but at the cost ofgreater security but at the cost of
significant complexity and powersignificant complexity and power
4
Conventional Encryption Systems for StreamConventional Encryption Systems for Stream
CiphersCiphers
MAC
PHY
PHY
Channel
Encryption
Function
MAC
Data Path
Encryption
Algorithm
Key K
MAC
Decryption
Function
MAC
Data Path
Decryption
Algorithm
Key K
Recording Point &
Decryption Point
Coincide
Hardware
 Encryption done at MAC layer
 At the receiver
 The decrypted data is available
at Hardware-Software interface –
hence recordable
 Commutative Property of the
operator makes it prone to attacks
 Possible remedy – Use of
Initialization Vector (IV) and
frequent changing of IV and Master
Key
 Length of IV limited
 Changing of Master Key calls for
sophisticated key distribution
algorithms
5
Proposed Encryption SystemProposed Encryption System
MAC
Channel
Encoder
Modulator
Channel
Demodulator
Channel
DecoderMAC
PHY
PHY
Encryption
Function
Encryption
Algorithm
Key K
Decryption
Function
Encryption
Algorithm
Key K
 Encryption done at
PHY layer
 Encryption
Function - XOR or
some other PHY layer
transforms like
 Scrambling
 Phase Shift
between I and Q
channels etc.
Advantages
 Decrypted data directly not available to the Hacker for Recording as normally PHY is
located within a embedded chipset.
 Presence of Difficult-to-Invert blocks like Channel Decoder between the recording
point at MAC-PHY interface and Decryption point makes known plain-text attack very
difficult
Recording
Point
Decryption
Point
Hardware
Decryption can
be moved here also
Encryption can
be moved here also
6
How ‘difficult’ is ‘difficult-to-invert’How ‘difficult’ is ‘difficult-to-invert’
• Channel decoders employ error control decodingChannel decoders employ error control decoding
• Any error control decoder, by property is a many-to-one mapper andAny error control decoder, by property is a many-to-one mapper and
hence is difficult-to-inverthence is difficult-to-invert
Upper Bound for hacking complexityUpper Bound for hacking complexity
(n.k) block code (convolutional code can also be seen as a block code)(n.k) block code (convolutional code can also be seen as a block code)
:: nn andand kk are the number of output and input bits respectivelyare the number of output and input bits respectively
Total No. of codewords – 2Total No. of codewords – 2kk
Therefore, 2Therefore, 2(n-k)(n-k)
sequences can be mapped to a particular code word.sequences can be mapped to a particular code word.
Therefore, the complexity introduced is 2Therefore, the complexity introduced is 2(n-k)(n-k)
-- the complexity increases with an increase in the coding redundancythe complexity increases with an increase in the coding redundancy
7
Hacking Complexity for well-knownHacking Complexity for well-known
standardsstandards
Standard Error Control Coding (n,k) Hacking
Complexity –
Upper Bound
HSUPA Reed-Muller (32,10) 222
CDMA-2000
EV-DO (traffic
channel)
Convolutional (512,256) 2256
802.16a Wi-Max Convolutional (24,12) 212
802.11g WLAN Convolutional (48,24) 224
Bluetooth Shortened Hamming
Code
(15,10) 25
8
Communication Performance RequirementCommunication Performance Requirement
• The encryption / decryption function should be such that it does not affectThe encryption / decryption function should be such that it does not affect
the communication performance like throughput/BER for AWGN andthe communication performance like throughput/BER for AWGN and
Fading channel scenariosFading channel scenarios
• A criteria needs to be developed to qualify the encryption function againstA criteria needs to be developed to qualify the encryption function against
the above pointthe above point
– Existing stream ciphers like RC4 can also be used as encryptionExisting stream ciphers like RC4 can also be used as encryption
functions as long as they satisfy the criteriafunctions as long as they satisfy the criteria
9
Criteria for Encryption FunctionCriteria for Encryption Function
For AWGN ChannelsFor AWGN Channels
1.1. Encryption/Decryption function should not destroy the minimumEncryption/Decryption function should not destroy the minimum
distance property of the code wordsdistance property of the code words
2.2. Decryption function should not have memory so that it cannot propagateDecryption function should not have memory so that it cannot propagate
error – linear functions satisfy thiserror – linear functions satisfy this
E(v,s) = P.v, v:input stream, s: ciphersteamE(v,s) = P.v, v:input stream, s: ciphersteam
For Fading ChannelsFor Fading Channels
1.1. In addition to the above criteria, |P|In addition to the above criteria, |P|22
= 1= 1
Possible functions to satisfy above criteria: symbol level XOR, scrambler,Possible functions to satisfy above criteria: symbol level XOR, scrambler,
phase shifterphase shifter
10
Simulation StudySimulation Study
• Any existing stream cipher encryption algorithm can be used to generateAny existing stream cipher encryption algorithm can be used to generate
the cipher stream (like RC4)the cipher stream (like RC4)
• Other random number generators like simple PN sequence generatorsOther random number generators like simple PN sequence generators
can also be used to generate the cipher stream with the key as seedcan also be used to generate the cipher stream with the key as seed
• Possible encryption functionsPossible encryption functions
1.1. Symbol level XOR (i.e. invert if cipher stream bit is 1, pass-Symbol level XOR (i.e. invert if cipher stream bit is 1, pass-
through if cipher stream bit is zero) with cipher streamthrough if cipher stream bit is zero) with cipher stream
2.2. Scramble the channel coded data stream according to theScramble the channel coded data stream according to the
cipher stream generatedcipher stream generated
3.3. Introduce a phase shift that is a function of the generated cipherIntroduce a phase shift that is a function of the generated cipher
stream value – constellation rotation / reorientationstream value – constellation rotation / reorientation
11
Simulation Performance ResultsSimulation Performance Results
Simulation Parameters
Convolutional Encoder
Constraint Length=7
Polynomial=[171 133] octal
Viterbi Decoder
Traceback Length = 48
Soft Decision
3 bits quantization
Channel
AWGN with Linear Phase filter
Equalization
Channel response assumed to
be estimated a-priori using
training sequences
BPSK with channel
1.E-05
1.E-04
1.E-03
1.E-02
1.E-01
1.E+00
-6 -3 0 3 6
SNR(dB)
BER
Conventional
XOR
Scramble
Phase shift
12
Simulation Performance ResultsSimulation Performance Results
Simulation Parameters
Convolutional Encoder
Constraint Length=7
Polynomial=[171 133] octal
Viterbi Decoder
Traceback Length = 48
Soft Decision
3 bits quantization
Channel
AWGN with Linear Phase filter
Equalization
Channel response assumed to
be estimated a-priori using
training sequences
QPSK with channel
1.E-05
1.E-04
1.E-03
1.E-02
1.E-01
1.E+00
-3 -1 1 3 5 7 9
SNR(dB)
BER
Conventional
XOR
Scramble
Phase shift
13
Simulation Performance ResultsSimulation Performance Results
Simulation Parameters
Convolutional Encoder
Constraint Length=7
Polynomial=[171 133] octal
Viterbi Decoder
Traceback Length = 48
Soft Decision
3 bits quantization
Channel
AWGN with Linear Phase filter
Equalization
Channel response assumed to
be estimated a-priori using
training sequences
QAM-16 with channel
1.E-05
1.E-04
1.E-03
1.E-02
1.E-01
1.E+00
0 3 6 9 12 15 18
SNR(dB)
BER
Conventional
XOR
Scramble
Phase shift
14
Future WorkFuture Work
• Simulation level verification on practical standards based systems toSimulation level verification on practical standards based systems to
show that the proposed system does not degrade communicationshow that the proposed system does not degrade communication
performanceperformance
• Performance effects on systems using blind and semi-blind equalizationPerformance effects on systems using blind and semi-blind equalization
• Strict analysis of the hacking complexity for different error control codingStrict analysis of the hacking complexity for different error control coding
schemes – upper-bound reductionschemes – upper-bound reduction
• Suggestion for error control coding schemes that provide better securitySuggestion for error control coding schemes that provide better security
• Exploring a joint Encryption and Error Control Coding schemeExploring a joint Encryption and Error Control Coding scheme
• Extend the idea for block ciphersExtend the idea for block ciphers
15
ConclusionConclusion
• No communication performance degradation if encryption functionNo communication performance degradation if encryption function
chosen according to the criteria developedchosen according to the criteria developed
– For both AWGN and Fading ChannelsFor both AWGN and Fading Channels
• Can enhance the security of the existing stream ciphers significantlyCan enhance the security of the existing stream ciphers significantly
• Simple LFSR based random number generators like PN sequenceSimple LFSR based random number generators like PN sequence
generator can also be used thereby significantly reducing powergenerator can also be used thereby significantly reducing power
consumed and chip areaconsumed and chip area
• No significant increase in hardware complexity as it just repositionsNo significant increase in hardware complexity as it just repositions
existing encryption blocks with minor modificationsexisting encryption blocks with minor modifications
• No effect on existing Key distribution systemsNo effect on existing Key distribution systems
Can be used as a viable alternative to block ciphers at a significantlyCan be used as a viable alternative to block ciphers at a significantly
lower costlower cost
16
ReferencesReferences
[1][1] William Stallings, Cryptography and Network Security, 2ed., 2000William Stallings, Cryptography and Network Security, 2ed., 2000
Prentice Hall, New Jersey.Prentice Hall, New Jersey.
[2][2] Randall K. Nichols, Panos C. Lekkas, Wireless Security, 2002, McGraw-Randall K. Nichols, Panos C. Lekkas, Wireless Security, 2002, McGraw-
HillHill
[3] IEEE Standards for 802.11g, 802.16 rev.D, Bluetooth[3] IEEE Standards for 802.11g, 802.16 rev.D, Bluetooth
[4] Standards for UMTS rel. 6, CDMA 1xEVDO[4] Standards for UMTS rel. 6, CDMA 1xEVDO
17
Thank YouThank You

More Related Content

What's hot

Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comRishabh Dangwal
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overviewOded Ben-Dori
 
Shah Md Zobair(063560056)
Shah Md Zobair(063560056)Shah Md Zobair(063560056)
Shah Md Zobair(063560056)mashiur
 
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Sridhar Kumar N
 
5. Rumba presentation
5. Rumba presentation5. Rumba presentation
5. Rumba presentationARCFIRE ICT
 
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksOptimization of Low-efficiency Traffic in OpenFlowSoftware Defined Networks
Optimization of Low-efficiency Traffic in OpenFlow Software Defined NetworksJose Saldana
 
Telecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsTelecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsP1Security
 
Packet-to-Packet Applications
Packet-to-Packet ApplicationsPacket-to-Packet Applications
Packet-to-Packet ApplicationsVideoguy
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET Journal
 

What's hot (18)

Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.comEigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
Eigrp Cheatsheet - EIGRP in 15 min - Rishabh Dangwal - www.theprohack.com
 
Sip technology overview
Sip technology overviewSip technology overview
Sip technology overview
 
Resume_Jayachandra
Resume_JayachandraResume_Jayachandra
Resume_Jayachandra
 
Resume_Jayachandra
Resume_JayachandraResume_Jayachandra
Resume_Jayachandra
 
San 2
San 2San 2
San 2
 
Shah Md Zobair(063560056)
Shah Md Zobair(063560056)Shah Md Zobair(063560056)
Shah Md Zobair(063560056)
 
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage Session Initiation Protocol (SIP)– Via Header Detailed Coverage
Session Initiation Protocol (SIP)– Via Header Detailed Coverage
 
5. Rumba presentation
5. Rumba presentation5. Rumba presentation
5. Rumba presentation
 
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
Optimization of Low-efficiency Traffic in OpenFlowSoftware Defined NetworksOptimization of Low-efficiency Traffic in OpenFlowSoftware Defined Networks
Optimization of Low-efficiency Traffic in OpenFlow Software Defined Networks
 
Tcp 6[1]
Tcp 6[1]Tcp 6[1]
Tcp 6[1]
 
Telecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsTelecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronights
 
Sit training cr
Sit training crSit training cr
Sit training cr
 
Iperf Tutorial
Iperf Tutorial Iperf Tutorial
Iperf Tutorial
 
Packet-to-Packet Applications
Packet-to-Packet ApplicationsPacket-to-Packet Applications
Packet-to-Packet Applications
 
Surf Communication Solutions - Packet To Packet Apps
Surf Communication Solutions - Packet To Packet AppsSurf Communication Solutions - Packet To Packet Apps
Surf Communication Solutions - Packet To Packet Apps
 
Ppp
PppPpp
Ppp
 
Fast Convergence in IP Network
Fast Convergence in IP Network Fast Convergence in IP Network
Fast Convergence in IP Network
 
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
IRJET- Overview of Hole Punching: ICMP Hole Punching, TCP Hole Punching, UDP ...
 

Viewers also liked

Tidc2007 cardionet
Tidc2007 cardionetTidc2007 cardionet
Tidc2007 cardionetArpan Pal
 
Isce osk tcs
Isce osk tcsIsce osk tcs
Isce osk tcsArpan Pal
 
Wnmc2004 wireless future
Wnmc2004 wireless futureWnmc2004 wireless future
Wnmc2004 wireless futureArpan Pal
 
Smart tv arpan pal
Smart tv arpan palSmart tv arpan pal
Smart tv arpan palArpan Pal
 
Ubiquity iot arpan pal
Ubiquity iot arpan palUbiquity iot arpan pal
Ubiquity iot arpan palArpan Pal
 
La participación de las asociaciones de pacientes en la investigación
La participación de las asociaciones de pacientes en la investigaciónLa participación de las asociaciones de pacientes en la investigación
La participación de las asociaciones de pacientes en la investigaciónJorge Pacheco
 
On screen kbd tcs
On screen kbd tcsOn screen kbd tcs
On screen kbd tcsArpan Pal
 
I tac tics_ntelligent infra_r&d
I tac tics_ntelligent infra_r&dI tac tics_ntelligent infra_r&d
I tac tics_ntelligent infra_r&dArpan Pal
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phonesArpan Pal
 
Ncc2004 ofdm tutorial part ii-apal
Ncc2004 ofdm tutorial   part ii-apalNcc2004 ofdm tutorial   part ii-apal
Ncc2004 ofdm tutorial part ii-apalArpan Pal
 
Wireless security
Wireless securityWireless security
Wireless securityArpan Pal
 
Goodbye Levels- Hello Reading Behaviors
Goodbye Levels- Hello Reading BehaviorsGoodbye Levels- Hello Reading Behaviors
Goodbye Levels- Hello Reading BehaviorsMichele Byrne
 
Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless securityArpan Pal
 
Ncc2004 ofdm tutorial part i-rvr
Ncc2004 ofdm tutorial   part i-rvrNcc2004 ofdm tutorial   part i-rvr
Ncc2004 ofdm tutorial part i-rvrArpan Pal
 

Viewers also liked (15)

Tidc2007 cardionet
Tidc2007 cardionetTidc2007 cardionet
Tidc2007 cardionet
 
Isce osk tcs
Isce osk tcsIsce osk tcs
Isce osk tcs
 
Wnmc2004 wireless future
Wnmc2004 wireless futureWnmc2004 wireless future
Wnmc2004 wireless future
 
Smart tv arpan pal
Smart tv arpan palSmart tv arpan pal
Smart tv arpan pal
 
Ubiquity iot arpan pal
Ubiquity iot arpan palUbiquity iot arpan pal
Ubiquity iot arpan pal
 
La participación de las asociaciones de pacientes en la investigación
La participación de las asociaciones de pacientes en la investigaciónLa participación de las asociaciones de pacientes en la investigación
La participación de las asociaciones de pacientes en la investigación
 
On screen kbd tcs
On screen kbd tcsOn screen kbd tcs
On screen kbd tcs
 
I tac tics_ntelligent infra_r&d
I tac tics_ntelligent infra_r&dI tac tics_ntelligent infra_r&d
I tac tics_ntelligent infra_r&d
 
RESUME PDF:MF
RESUME PDF:MFRESUME PDF:MF
RESUME PDF:MF
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phones
 
Ncc2004 ofdm tutorial part ii-apal
Ncc2004 ofdm tutorial   part ii-apalNcc2004 ofdm tutorial   part ii-apal
Ncc2004 ofdm tutorial part ii-apal
 
Wireless security
Wireless securityWireless security
Wireless security
 
Goodbye Levels- Hello Reading Behaviors
Goodbye Levels- Hello Reading BehaviorsGoodbye Levels- Hello Reading Behaviors
Goodbye Levels- Hello Reading Behaviors
 
Mngn2005 wireless security
Mngn2005 wireless securityMngn2005 wireless security
Mngn2005 wireless security
 
Ncc2004 ofdm tutorial part i-rvr
Ncc2004 ofdm tutorial   part i-rvrNcc2004 ofdm tutorial   part i-rvr
Ncc2004 ofdm tutorial part i-rvr
 

Similar to Wpmc2004 phy protection

Similar to Wpmc2004 phy protection (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier SystemsFPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier Systems
 
Coding
CodingCoding
Coding
 
Forward error correction
Forward error correctionForward error correction
Forward error correction
 
Y25124127
Y25124127Y25124127
Y25124127
 
Turbo Codes
Turbo CodesTurbo Codes
Turbo Codes
 
Wireless intelligent networking
Wireless intelligent networkingWireless intelligent networking
Wireless intelligent networking
 
Hv3414491454
Hv3414491454Hv3414491454
Hv3414491454
 
Signal Distortion Techniques for PAPR Reduction in OFDM systems
Signal Distortion Techniques for PAPR Reduction in OFDM systemsSignal Distortion Techniques for PAPR Reduction in OFDM systems
Signal Distortion Techniques for PAPR Reduction in OFDM systems
 
C C N A Day5
C C N A  Day5C C N A  Day5
C C N A Day5
 
Kartik_Parmar_Resume_2016
Kartik_Parmar_Resume_2016Kartik_Parmar_Resume_2016
Kartik_Parmar_Resume_2016
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
 
Distributed IP-PBX
Distributed IP-PBX Distributed IP-PBX
Distributed IP-PBX
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Lte network planning huawei technologies
Lte network planning huawei technologiesLte network planning huawei technologies
Lte network planning huawei technologies
 
Adam_Mcconnell_Revision3
Adam_Mcconnell_Revision3Adam_Mcconnell_Revision3
Adam_Mcconnell_Revision3
 

More from Arpan Pal

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpalArpan Pal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Arpan Pal
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpalArpan Pal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gwsArpan Pal
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating thingsArpan Pal
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-worldArpan Pal
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012Arpan Pal
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccsArpan Pal
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012Arpan Pal
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012Arpan Pal
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan Pal
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besuArpan Pal
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocrArpan Pal
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epgArpan Pal
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsrArpan Pal
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesArpan Pal
 
Hip case study tcs iitb
Hip case study tcs iitbHip case study tcs iitb
Hip case study tcs iitbArpan Pal
 

More from Arpan Pal (20)

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gws
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccs
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besu
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocr
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epg
 
Embedded
EmbeddedEmbedded
Embedded
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsr
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallenges
 
Generic mac
Generic macGeneric mac
Generic mac
 
Heig tcs
Heig tcsHeig tcs
Heig tcs
 
Hip case study tcs iitb
Hip case study tcs iitbHip case study tcs iitb
Hip case study tcs iitb
 

Wpmc2004 phy protection

  • 1. 1 Enhancement of Security of WirelessEnhancement of Security of Wireless Networks using Physical Layer ProtectionNetworks using Physical Layer Protection Arpan PalArpan Pal 11 , Srinivasa Rao Ch., Srinivasa Rao Ch. 11 , Suvra Sekhar Das, Suvra Sekhar Das 22 , Balamuralidhar P., Balamuralidhar P. 11 ,, Harish ReddyHarish Reddy 11 1 Embedded Systems Group, Tata Consultancy Services Ltd., India 2 Embedded Systems Group, Tata Consultancy Services Ltd., India and Center for TeleInFrastruktur (CTiF), Aalborg University, Denmark
  • 2. 2 AgendaAgenda  Conventional Encryption Systems  Proposed System  Communication System Performance Requirement  Hacking Complexity  Simulation Study  Future Work  Conclusion  References
  • 3. 3 Stream CiphersStream Ciphers Conventional Encryption SystemsConventional Encryption Systems Block CiphersBlock Ciphers Examples RC4, A5 Advantages  Relatively Less Complex (LFSR based implementation) and hence faster implementation  Normally Consumes less area and power – important for handheld devices Disadvantages  mostly uses Vernam ciphers − easy for known-plain text attack, substitution attack, key-reuse attack Examples DES, 3DES, AES Advantages  Highly Secure (for block sizes > 64 and key lengths > 80) Disadvantages  Padding inefficiency if input data is less than the block length  Relatively Complex and hence CPU-intensive implementation  Consumes large area and power – bottleneck for handheld devices Block Ciphers, in general provideBlock Ciphers, in general provide greater security but at the cost ofgreater security but at the cost of significant complexity and powersignificant complexity and power
  • 4. 4 Conventional Encryption Systems for StreamConventional Encryption Systems for Stream CiphersCiphers MAC PHY PHY Channel Encryption Function MAC Data Path Encryption Algorithm Key K MAC Decryption Function MAC Data Path Decryption Algorithm Key K Recording Point & Decryption Point Coincide Hardware  Encryption done at MAC layer  At the receiver  The decrypted data is available at Hardware-Software interface – hence recordable  Commutative Property of the operator makes it prone to attacks  Possible remedy – Use of Initialization Vector (IV) and frequent changing of IV and Master Key  Length of IV limited  Changing of Master Key calls for sophisticated key distribution algorithms
  • 5. 5 Proposed Encryption SystemProposed Encryption System MAC Channel Encoder Modulator Channel Demodulator Channel DecoderMAC PHY PHY Encryption Function Encryption Algorithm Key K Decryption Function Encryption Algorithm Key K  Encryption done at PHY layer  Encryption Function - XOR or some other PHY layer transforms like  Scrambling  Phase Shift between I and Q channels etc. Advantages  Decrypted data directly not available to the Hacker for Recording as normally PHY is located within a embedded chipset.  Presence of Difficult-to-Invert blocks like Channel Decoder between the recording point at MAC-PHY interface and Decryption point makes known plain-text attack very difficult Recording Point Decryption Point Hardware Decryption can be moved here also Encryption can be moved here also
  • 6. 6 How ‘difficult’ is ‘difficult-to-invert’How ‘difficult’ is ‘difficult-to-invert’ • Channel decoders employ error control decodingChannel decoders employ error control decoding • Any error control decoder, by property is a many-to-one mapper andAny error control decoder, by property is a many-to-one mapper and hence is difficult-to-inverthence is difficult-to-invert Upper Bound for hacking complexityUpper Bound for hacking complexity (n.k) block code (convolutional code can also be seen as a block code)(n.k) block code (convolutional code can also be seen as a block code) :: nn andand kk are the number of output and input bits respectivelyare the number of output and input bits respectively Total No. of codewords – 2Total No. of codewords – 2kk Therefore, 2Therefore, 2(n-k)(n-k) sequences can be mapped to a particular code word.sequences can be mapped to a particular code word. Therefore, the complexity introduced is 2Therefore, the complexity introduced is 2(n-k)(n-k) -- the complexity increases with an increase in the coding redundancythe complexity increases with an increase in the coding redundancy
  • 7. 7 Hacking Complexity for well-knownHacking Complexity for well-known standardsstandards Standard Error Control Coding (n,k) Hacking Complexity – Upper Bound HSUPA Reed-Muller (32,10) 222 CDMA-2000 EV-DO (traffic channel) Convolutional (512,256) 2256 802.16a Wi-Max Convolutional (24,12) 212 802.11g WLAN Convolutional (48,24) 224 Bluetooth Shortened Hamming Code (15,10) 25
  • 8. 8 Communication Performance RequirementCommunication Performance Requirement • The encryption / decryption function should be such that it does not affectThe encryption / decryption function should be such that it does not affect the communication performance like throughput/BER for AWGN andthe communication performance like throughput/BER for AWGN and Fading channel scenariosFading channel scenarios • A criteria needs to be developed to qualify the encryption function againstA criteria needs to be developed to qualify the encryption function against the above pointthe above point – Existing stream ciphers like RC4 can also be used as encryptionExisting stream ciphers like RC4 can also be used as encryption functions as long as they satisfy the criteriafunctions as long as they satisfy the criteria
  • 9. 9 Criteria for Encryption FunctionCriteria for Encryption Function For AWGN ChannelsFor AWGN Channels 1.1. Encryption/Decryption function should not destroy the minimumEncryption/Decryption function should not destroy the minimum distance property of the code wordsdistance property of the code words 2.2. Decryption function should not have memory so that it cannot propagateDecryption function should not have memory so that it cannot propagate error – linear functions satisfy thiserror – linear functions satisfy this E(v,s) = P.v, v:input stream, s: ciphersteamE(v,s) = P.v, v:input stream, s: ciphersteam For Fading ChannelsFor Fading Channels 1.1. In addition to the above criteria, |P|In addition to the above criteria, |P|22 = 1= 1 Possible functions to satisfy above criteria: symbol level XOR, scrambler,Possible functions to satisfy above criteria: symbol level XOR, scrambler, phase shifterphase shifter
  • 10. 10 Simulation StudySimulation Study • Any existing stream cipher encryption algorithm can be used to generateAny existing stream cipher encryption algorithm can be used to generate the cipher stream (like RC4)the cipher stream (like RC4) • Other random number generators like simple PN sequence generatorsOther random number generators like simple PN sequence generators can also be used to generate the cipher stream with the key as seedcan also be used to generate the cipher stream with the key as seed • Possible encryption functionsPossible encryption functions 1.1. Symbol level XOR (i.e. invert if cipher stream bit is 1, pass-Symbol level XOR (i.e. invert if cipher stream bit is 1, pass- through if cipher stream bit is zero) with cipher streamthrough if cipher stream bit is zero) with cipher stream 2.2. Scramble the channel coded data stream according to theScramble the channel coded data stream according to the cipher stream generatedcipher stream generated 3.3. Introduce a phase shift that is a function of the generated cipherIntroduce a phase shift that is a function of the generated cipher stream value – constellation rotation / reorientationstream value – constellation rotation / reorientation
  • 11. 11 Simulation Performance ResultsSimulation Performance Results Simulation Parameters Convolutional Encoder Constraint Length=7 Polynomial=[171 133] octal Viterbi Decoder Traceback Length = 48 Soft Decision 3 bits quantization Channel AWGN with Linear Phase filter Equalization Channel response assumed to be estimated a-priori using training sequences BPSK with channel 1.E-05 1.E-04 1.E-03 1.E-02 1.E-01 1.E+00 -6 -3 0 3 6 SNR(dB) BER Conventional XOR Scramble Phase shift
  • 12. 12 Simulation Performance ResultsSimulation Performance Results Simulation Parameters Convolutional Encoder Constraint Length=7 Polynomial=[171 133] octal Viterbi Decoder Traceback Length = 48 Soft Decision 3 bits quantization Channel AWGN with Linear Phase filter Equalization Channel response assumed to be estimated a-priori using training sequences QPSK with channel 1.E-05 1.E-04 1.E-03 1.E-02 1.E-01 1.E+00 -3 -1 1 3 5 7 9 SNR(dB) BER Conventional XOR Scramble Phase shift
  • 13. 13 Simulation Performance ResultsSimulation Performance Results Simulation Parameters Convolutional Encoder Constraint Length=7 Polynomial=[171 133] octal Viterbi Decoder Traceback Length = 48 Soft Decision 3 bits quantization Channel AWGN with Linear Phase filter Equalization Channel response assumed to be estimated a-priori using training sequences QAM-16 with channel 1.E-05 1.E-04 1.E-03 1.E-02 1.E-01 1.E+00 0 3 6 9 12 15 18 SNR(dB) BER Conventional XOR Scramble Phase shift
  • 14. 14 Future WorkFuture Work • Simulation level verification on practical standards based systems toSimulation level verification on practical standards based systems to show that the proposed system does not degrade communicationshow that the proposed system does not degrade communication performanceperformance • Performance effects on systems using blind and semi-blind equalizationPerformance effects on systems using blind and semi-blind equalization • Strict analysis of the hacking complexity for different error control codingStrict analysis of the hacking complexity for different error control coding schemes – upper-bound reductionschemes – upper-bound reduction • Suggestion for error control coding schemes that provide better securitySuggestion for error control coding schemes that provide better security • Exploring a joint Encryption and Error Control Coding schemeExploring a joint Encryption and Error Control Coding scheme • Extend the idea for block ciphersExtend the idea for block ciphers
  • 15. 15 ConclusionConclusion • No communication performance degradation if encryption functionNo communication performance degradation if encryption function chosen according to the criteria developedchosen according to the criteria developed – For both AWGN and Fading ChannelsFor both AWGN and Fading Channels • Can enhance the security of the existing stream ciphers significantlyCan enhance the security of the existing stream ciphers significantly • Simple LFSR based random number generators like PN sequenceSimple LFSR based random number generators like PN sequence generator can also be used thereby significantly reducing powergenerator can also be used thereby significantly reducing power consumed and chip areaconsumed and chip area • No significant increase in hardware complexity as it just repositionsNo significant increase in hardware complexity as it just repositions existing encryption blocks with minor modificationsexisting encryption blocks with minor modifications • No effect on existing Key distribution systemsNo effect on existing Key distribution systems Can be used as a viable alternative to block ciphers at a significantlyCan be used as a viable alternative to block ciphers at a significantly lower costlower cost
  • 16. 16 ReferencesReferences [1][1] William Stallings, Cryptography and Network Security, 2ed., 2000William Stallings, Cryptography and Network Security, 2ed., 2000 Prentice Hall, New Jersey.Prentice Hall, New Jersey. [2][2] Randall K. Nichols, Panos C. Lekkas, Wireless Security, 2002, McGraw-Randall K. Nichols, Panos C. Lekkas, Wireless Security, 2002, McGraw- HillHill [3] IEEE Standards for 802.11g, 802.16 rev.D, Bluetooth[3] IEEE Standards for 802.11g, 802.16 rev.D, Bluetooth [4] Standards for UMTS rel. 6, CDMA 1xEVDO[4] Standards for UMTS rel. 6, CDMA 1xEVDO