Rand-OFDM: A Secured Wireless Signal

Wireless communication has been a broadcast system since its inception, which violates security and privacy issues at the physical layer between the intended transmit and receive pairs. As we move towards advanced spectrum sharing methodologies involving billions of devices connected over wireless networks, it is essential to secure the wireless signal such that only the intended receiver can realize the properties of the signal. In this paper, we propose Rand-OFDM, a new waveform, secured with a shared secret key, where the signal properties can be recovered only at the expected receiver. We achieve the signal level security by modifying the OFDM signal in time-domain, thus erasing the OFDM properties and in turn obfuscating the signal properties to an eavesdropper. We introduce a key-based secured training signal for channel estimation, which can be used only at the intended receiver with prior knowledge of the key. As a final step for recovery of the signal, we use a clustering based technique to correct the phase of the received signal. Our cryptanalysis shows that Rand-OFDM is especially useful in future wide band signals. Extensive simulation and over-the-air experiments show that the performance of Rand-OFDM is comparable to legacy OFDM and SNR penalty due to the secured waveform varies between ≈ 1-4dB. In all these scenarios, Rand-OFDM remains unrecognized by the adversary even at the highest possible SNR.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Stefania Sesia,et al.  LTE - The UMTS Long Term Evolution, Second Edition , 2011 .

[3]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[4]  Chong-Yung Chi,et al.  Power Allocation and Time-Domain Artificial Noise Design for Wiretap OFDM with Discrete Inputs , 2013, IEEE Transactions on Wireless Communications.

[5]  Dirk Grunwald,et al.  Secret Agent Radio: Covert Communication through Dirty Constellations , 2012, Information Hiding.

[6]  S. Weinstein,et al.  Data Transmission by Frequency-Division Multiplexing Using the Discrete Fourier Transform , 1971 .

[7]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[8]  Alexandros G. Fragkiadakis,et al.  A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.

[9]  Guang Gong,et al.  A new efficient physical layer OFDM encryption scheme , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[10]  Ali Chehab,et al.  An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach , 2019, IEEE Internet of Things Journal.

[11]  Changho Suh,et al.  Comparative study of time-domain and frequency-domain channel estimation in MIMO-OFDM systems , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..

[12]  A. Lee Swindlehurst,et al.  Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.

[13]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[14]  Gianmarco Baldini,et al.  Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.

[15]  Haji M. Furqan,et al.  Enhancing physical layer security of OFDM systems using channel shortening , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[16]  Peter J. Rousseeuw,et al.  Clustering by means of medoids , 1987 .

[17]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[18]  Haji M. Furqan,et al.  Secure pre-coding and post-coding for OFDM systems along with hardware implementation , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[19]  Sennur Ulukus,et al.  Achievable Rates in Gaussian MISO Channels with Secrecy Constraints , 2007, 2007 IEEE International Symposium on Information Theory.

[20]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[21]  Junqing Zhang,et al.  Design of an OFDM Physical Layer Encryption Scheme , 2017, IEEE Transactions on Vehicular Technology.

[22]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[23]  Rafael F. Schaefer,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[24]  Hüseyin Arslan,et al.  Secure communication in frequency selective channels with fade-avoiding subchannel usage , 2014, 2014 IEEE International Conference on Communications Workshops (ICC).

[25]  Jehad M. Hamamreh,et al.  OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.

[26]  Mohamed-Slim Alouini,et al.  On the Finite-SNR Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme under Secrecy Constraint , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).