Creating secure wireless regions using configurable beamforming

We present a novel approach to network security against passive eavesdroppers by employing a configurable beam-forming technique to create tightly defined regions of coverage for targeted users. In contrast to conventional encryption methods, our security scheme is developed at the physical layer by configuring antenna array beam patterns to transmit the data to specific regions. It is shown that this technique can effectively reduce vulnerability of the physical regions to eavesdropping by adapting the antenna configuration according to the intended user's channel state information. In this paper we present the application of our concept to 802.11n networks where an antenna array is employed at the access point, and consider the issue of minimizing the coverage area of the region surrounding the targeted user. A metric termed the exposure region is formally defined and used to evaluate the level of security offered by this technique. A range of antenna array configurations are examined through analysis and simulation, and these are subsequently used to obtain the optimum array configuration for a user traversing a coverage area.

[1]  D. Grunwald,et al.  Enhancing WLAN security with smart antennas: a physical layer response for information assurance , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[2]  Erik Tews,et al.  Practical attacks against WEP and WPA , 2009, WiSec '09.

[3]  Raghupathy Sivakumar,et al.  Aegis: Physical Space Security for Wireless Networks With Smart Antennas , 2010, IEEE/ACM Transactions on Networking.

[4]  Thomas K. Paul,et al.  Wireless LAN Comes of Age: Understanding the IEEE 802.11n Amendment , 2008, IEEE Circuits and Systems Magazine.

[5]  V. Palanisamy,et al.  Enhancing WLAN security with sectored antennas , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.

[6]  Raghupathy Sivakumar,et al.  Securing Wireless Data Networks against Eavesdropping using Smart Antennas , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[7]  F. Gross Smart Antennas for Wireless Communications: With MATLAB , 2005 .

[8]  Bahram Vazirnezhad,et al.  Proposing a hybrid protocol for secure wireless networks based on signcryption scheme , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[9]  Junwei Lu,et al.  Increased security level using space-division approach in wireless computing network , 2005, 2005 Asia-Pacific Microwave Conference Proceedings.

[10]  Vinko Erceg IEEE P802.11 Wireless LANs TGn Channel Models , 2004 .

[11]  Ting Wang,et al.  Enhancing wireless communication privacy with artificial fading , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[12]  V. Erceg,et al.  TGn Channel Models , 2004 .