Skip to main content

Secure Interleaving - Physical Layer Security Enhancement of OFDM Based System

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 171))

Abstract

Interleavers are typically used to distribute burst of errors, so they appear as simple random errors. Alternatively, if interleaving patterns are kept secure, then these patterns can be introduced as a physical (PHY) layer security device. In this paper, an efficient technique to introduce security at physical (PHY) layer is proposed to enhance the security of 802.11i, which is designed to improve the security at medium access control. Since it does not emphasize on availability therefore several denial of service (DoS) attacks are possible. The DoS attacks are easy to mount because management and control frames are unprotected and so are MAC headers. This paper proposes a secure seed based random interleaving technique to scramble the OFDM constellation symbols to encrypt data transmission to resist these malicious attacks. In order to analyze the suitability of proposed technique as PHY layer security device keysensitivity analysis is carried out. The scrambling is completely reversible with the use of appropriate key. However, use of a wrong initial condition even at 4th decimal point produces entirely different sequence resulting in erroneous constellations with equal probability. To analyze the effectiveness of proposed technique various security attacks are analyzed in detail.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Liu, C., Yu, J.: A Solution to WLAN Authentication and Association DoS Attacks. IAENG International Journal of Computer Science 34(1) (2007)

    Google Scholar 

  2. Malekzadeh, M., Abdul Ghani, A.A., Ahmad Zulkarnain, Z., Muda, Z.: Security Improvement for Management Frames in IEEE 802.11 Wireless Networks. IJCSNS International Journal of Computer Science and Network Security 7(6) (June 2007)

    Google Scholar 

  3. Asif Khan, M., Asim, M., Jeoti, V.: Chaos Based Constellation Scrambling: Security and Interleaving Issues. In: ITSIM 2008, pp. 1–7 (August 26-28, 2008) ISBN: 978-1-4244-2327-9

    Google Scholar 

  4. Hiltunen, K.: WLAN attacks and risks, http://www.comlab.hut.fi/opetus/333/2004slides/topic30.pdf

  5. Xiao, Y., Pan, Y., Du, X., Bandela, C., Dass, K.: Security mechanism, attacks, and security enhancements for the IEEE 802.11 WLANs. International Journal of Wireless and Mobile Computing, special issue on Medium Access Control for WLANs, PANs and Sensor Network 1(3/4), 276–288 (2005)

    Google Scholar 

  6. He, C., Mitchell, J.C.: Security analysis and improvements for 802.11i. In: The 12th Annual Network and Distributed System Security Symposium, NDSS 2005, pp. 90–110 (February 2005)

    Google Scholar 

  7. Baranovsky, A., Daems, D.: The design of one dimensional chaotic maps with prescribed statistical properties. International Journal of Bifurcation of Chaos & Fractals 5(6) (1995)

    Google Scholar 

  8. Asim, M., Jeoti, V.: Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback. In: IEEE International Conference on Intelligent and Advanced Systems, pp. 736–741 (November 2007) ISBN: 978-1-4244-1355-3

    Google Scholar 

  9. Asif Khan, M.: A Novel Seed Based Random Interleaver Design for OFDM System and its PHY layer Security Issues, Master’s Thesis, Universiti Teknologi PETRONAS (2009)

    Google Scholar 

  10. Bellardo, J., Savage, S.: 802.11 Denial-of-Service attacks: Real vulnerabilities and practical solution. In: Usenix Security Symposium, pp. 15–28 (August 4-8, 2003)

    Google Scholar 

  11. Liu, C., Yu, J.T.: Review and Analysis of Wireless LAN Security Attacks and Solutions. Journal of International Engineering Consortium 59, 539–554 (2006) ISBN: 978-1-931695-53-4

    Google Scholar 

  12. Liu, C., Yu, J.T.: An Analysis of DoS Attacks on Wireless LAN. In: IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET 2006), Banff, Canada (2006)

    Google Scholar 

  13. Ding, P., Holliday, J., Celik, A.: Improving the Security of Wireless LANs by Managing 802.1X Disassociaion. In: Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV, pp. 53–58 (2004)

    Google Scholar 

  14. Grech, S., Nikkanen, J.: A Security Analysis of Wi-Fi Protected Access. In: The 9th Nordic Workshop on Secure IT-systems. Helsinki University of Technology, Finland (2004)

    Google Scholar 

  15. Ge, W., Sampalli, S.: A Novel Scheme For Prevention of Management Frame Attacks on Wireless LANs (2005)

    Google Scholar 

  16. Chen, D., Deng, J., Varshney, P.K.: Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming. In: ACM MobiCom 2003, Poster, San Diego, CA, USA (2003)

    Google Scholar 

  17. Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In: Proceedings of 2002 MILCOM Conference, vol. 2 (2002)

    Google Scholar 

  18. Vladimirov, A.A., Gavrilenko, K.V., Mikhailovsky, A.A., Wi-Foo: The Secrets of Wireless Hacking, pp. 159–195. Pearson/Addison Wesley (June 2004)

    Google Scholar 

  19. Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the 802.1X Standard. University of Maryland, CS-TR-4328, UMIACS-TR-2002-10 (February 2002)

    Google Scholar 

  20. Walker, J.: Status of Project IEEE 802.11 Task Group w, Protected Management Frames (2007), http://grouper.ieee.org/groups/802/11/Reports/tgw_update.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Asif Khan, M., Jeoti, V., Shahid Manzoor, R. (2011). Secure Interleaving - Physical Layer Security Enhancement of OFDM Based System. In: Yonazi, J.J., Sedoyeka, E., Ariwa, E., El-Qawasmeh, E. (eds) e-Technologies and Networks for Development. ICeND 2011. Communications in Computer and Information Science, vol 171. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22729-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22729-5_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22728-8

  • Online ISBN: 978-3-642-22729-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics