Secrecy beyond encryption: obfuscating transmission signatures in wireless communications

The privacy of a wireless user and the operation of a wireless network can be threatened by the leakage of side-channel information (SCI), even when encryption and authentication are employed. In this article, we describe various passive (traffic analysis) and active (jamming) attacks that are facilitated by SCI. Our goal is to highlight the need for novel PHY-layer security techniques that can be used to complement classical encryption methods. We discuss several of these techniques along with advanced hardware that exhibits promising capabilities for countering privacy and SCI-related attacks.

[1]  Thomas Ristenpart,et al.  Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.

[2]  Srinivasan Seshan,et al.  Improving wireless privacy with an identifier-free link layer protocol , 2008, MobiSys '08.

[3]  Loukas Lazos,et al.  Swift Jamming Attack on Frequency Offset Estimation: The Achilles’ Heel of OFDM Systems , 2016, IEEE Transactions on Mobile Computing.

[4]  Loukas Lazos,et al.  Security vulnerability and countermeasures of frequency offset correction in 802.11a systems , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[5]  Marwan Krunz,et al.  Friendly CryptoJam: a mechanism for securing physical-layer attributes , 2014, WiSec '14.

[6]  Srdjan Capkun,et al.  On Limitations of Friendly Jamming for Confidentiality , 2013, 2013 IEEE Symposium on Security and Privacy.

[7]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[8]  Matthias Hollick,et al.  Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems , 2014, NDSS.

[9]  Nagarajan Kandasamy,et al.  A real-time and protocol-aware reactive jamming framework built on software-defined radios , 2014, SRIF@SIGCOMM.

[10]  Fan Zhang,et al.  Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing , 2014, IEEE Transactions on Wireless Communications.

[11]  Fan Zhang,et al.  Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping , 2011, 2011 31st International Conference on Distributed Computing Systems.

[12]  Christoph Neumann,et al.  An Empirical Study of Passive 802.11 Device Fingerprinting , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[13]  Kevin W. Sowerby,et al.  Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers , 2014, J. Comput. Syst. Sci..

[14]  Fan Zhang,et al.  Inferring users' online activities through traffic analysis , 2011, WiSec '11.

[15]  Ivan Martinovic,et al.  Who do you sync you are?: smartphone fingerprinting via application behaviour , 2013, WiSec '13.

[16]  Marco Gruteser,et al.  Wireless device identification with radiometric signatures , 2008, MobiCom '08.

[17]  Rui Wang,et al.  Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.