TickSEC: A Novel Reconfigurable Platform for WiFi Physical Layer Security

The quality of the WiFi security verification platform often becomes a bottleneck that limits the effectiveness of research results. High-performance WiFi verification platform that supports physical layer programming has become an indispensable tool for WiFi security research. This paper has carried on the thorough analysis to the research of the WiFi security of the physical layer in recent years. Taking the research team's existing Tick system as preliminary work, we design and implement a verification platform TickSEC that supports the research of WiFi security at the physical layer. The platform support the real-time acquisition of physical layer information, and offer the programmability within the physical layer. We also propose a method of WiFi device identification using physical layer information from TickSEC as a case study. Test results show that TickSEC can meet the needs of physical layer WiFi security research in terms of performance and programmability.

[1]  Jie Yang,et al.  Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.

[2]  Brian W. Kernighan,et al.  WISE design of indoor wireless systems: practical computation and optimization , 1995 .

[3]  Ahmed Khattab,et al.  Demonstration Abstract: WARP – A Flexible Platform for Clean-Slate Wireless Medium Access Protocol Design , 2008 .

[4]  Prasant Mohapatra,et al.  Adaptive Wireless Channel Probing for Shared Key Generation Based on PID Controller , 2013, IEEE Transactions on Mobile Computing.

[5]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[6]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[7]  Shaojie Tang,et al.  KEEP: Fast secret key extraction protocol for D2D communication , 2014, 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS).

[8]  Xianbin Wang,et al.  Robust physical layer authentication using inherent properties of channel impulse response , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[9]  Eric Blossom,et al.  GNU radio: tools for exploring the radio frequency spectrum , 2004 .

[10]  Eyal de Lara,et al.  Ensemble: cooperative proximity-based authentication , 2010, MobiSys '10.

[11]  Qian Xu,et al.  Experimental Study on Key Generation for Physical Layer Security in Wireless Communications , 2016, IEEE Access.

[12]  Larry J. Greenstein,et al.  PHY-Authentication Protocol for Spoofing Detection in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[13]  Yang Wang,et al.  Fast and practical secret key extraction by exploiting channel response , 2013, 2013 Proceedings IEEE INFOCOM.

[14]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[15]  Tao Wang,et al.  The Tick Programmable Low-Latency SDR System , 2018, GETMBL.

[16]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).

[17]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.