[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3570361.3613282acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article
Public Access

M3A: Multipath Multicarrier Misinformation to Adversaries

Published: 02 October 2023 Publication History

Abstract

Wireless channels are vulnerable to eavesdroppers due to their broadcast nature. One approach to thwart an eavesdropper (Eve) is to decrease her SNR, e.g., by reducing the signal in her direction. Unfortunately, such methods are vulnerable to (1) a highly directional Eve that can increase her received signal strength and (2) Eve that is close to the receiver, Bob, or close to the transmitter, Alice. In this paper, we design and experimentally evaluate Multipath Multicarrier Misinformation to Adversaries (M3A), a system for Alice to send data to Bob while simultaneously sending misinformation to Eve. Our approach does not require knowledge of Eve's channel or location and, with multipath channels, randomly transforms Eve's symbols even if Eve is located one wavelength-scale distance from Bob (approximately 10 cm) or if Eve is located between Alice and Bob in their direct path (Eve is approximately 1/3 closer to Alice). In particular, our approach is to move each of Eve's received symbols (over time and across subcarriers), to an independently random transformation as compared to Bob, without Alice or Bob knowing Eve's location or channel. We realize this by modulating Alice's per-subcarrier beamforming weights with an i.i.d. random binary sequence, as if Alice had a separate antenna array for each subcarrier, and could randomly turn antennas in each array on and off. We implement M3A on a real-time Massive MIMO testbed and show that M3A can increase Eve's bit error rate more than two hundredfold compared to beamforming, even if she is positioned approximately a wavelength away, whether above, below, or beside Bob. Finally, to ensure reliability at Bob, we show that with M3A, Bob's bit error rate is approximately an order of magnitude lower than achieved with prior work.

References

[1]
Yulong Zou, Jia Zhu, Xianbin Wang, and Lajos Hanzo. A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9):1727--1765, 2016.
[2]
David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina Pöpper. Call me maybe: Eavesdropping encrypted LTE calls with ReVoLTE. In 29th USENIX security symposium (USENIX security 20), pages 73--88, 2020.
[3]
Martin Kotuliak, Simon Erni, Patrick Leu, Marc Roeschlin, and Srdjan Čapkun. LTrack: Stealthy tracking of mobile phones in LTE. In 31st USENIX Security Symposium (USENIX Security 22), pages 1291--1306, 2022.
[4]
Baik Hoh, Marco Gruteser, Hui Xiong, and Ansaf Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38--46, 2006.
[5]
Michael Rushanan, Aviel D Rubin, Denis Foo Kune, and Colleen M Swanson. Sok: Security and privacy in implantable medical devices and body area networks. In 2014 IEEE symposium on security and privacy, pages 524--539. IEEE, 2014.
[6]
Amitav Mukherjee. Physical-layer security in the internet of things: Sensing and communication confidentiality under resource constraints. Proceedings of the IEEE, 103(10):1747--1761, 2015.
[7]
Jehad M Hamamreh, Haji M Furqan, and Huseyin Arslan. Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Communications Surveys & Tutorials, 21(2):1773--1828, 2018.
[8]
H Vincent Poor and Rafael F Schaefer. Wireless physical layer security. Proceedings of the National Academy of Sciences, 114(1):19--26, 2017.
[9]
Ertuğrul Güvenkaya, Jehad M Hamamreh, and Hüseyin Arslan. On physical-layer concepts and metrics in secure signal transmission. Physical Communication, 25:14--25, 2017.
[10]
Muriel Médard and Ken R Duffy. Physical layer insecurity. In 2023 57th Annual Conference on Information Sciences and Systems (CISS). IEEE, 2023.
[11]
Evgeny Khorov, Anton Kiryanov, Andrey Lyakhov, and Giuseppe Bianchi. A tutorial on IEEE 802.11ax high efficiency WLANs. IEEE Communications Surveys & Tutorials, 21(1):197--216, 2018.
[12]
Erik Dahlman, Stefan Parkvall, and Johan Skold. 5G NR: The next generation wireless access technology. Academic Press, 2020.
[13]
Kanapathippillai Cumanan, Zhiguo Ding, Bayan Sharif, Gui Yun Tian, and Kin K Leung. Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper. IEEE Transactions on Vehicular Technology, 63(4):1678--1690, 2013.
[14]
Jong-Ho Lee, Jeongsik Choi, Woong-Hee Lee, and Jiho Song. Exploiting array pattern synthesis for physical layer security in millimeter wave channels. Electronics, 8(7):745, 2019.
[15]
Yongpeng Wu, Chengshan Xiao, Zhi Ding, Xiqi Gao, and Shi Jin. Linear precoding for finite-alphabet signaling over MIMOME wiretap channels. IEEE transactions on vehicular technology, 61(6):2599--2612, 2012.
[16]
Ying Ju, Hui-Ming Wang, Tong-Xing Zheng, and Qinye Yin. Secure transmissions in millimeter wave systems. IEEE Transactions on Communications, 65(5):2114--2127, 2017.
[17]
Chen Chen, Yue Dong, Xiang Cheng, and Na Yi. An iterative FFT-based antenna subset modulation for secure millimeter wave communications. In 2017 International Conference on Computing, Networking and Communications (ICNC), pages 454--459. IEEE, 2017.
[18]
Jixin Guo, Lorenzo Poli, Mohammad Abdul Hannan, Paolo Rocca, Shiwen Yang, and Andrea Massa. Time-modulated arrays for physical layer secure communications: optimization-based synthesis and experimental assessment. IEEE Transactions on Antennas and Propagation, 66(12):6939--6949, 2018.
[19]
Yuan Ding and Vincent Fusco. Experiment of digital directional modulation transmitters. In Forum for Electromagnetic Research Methods and Application Technologies (FERMAT), volume 11, 2015.
[20]
Naga Sasikanth Mannem, Tzu-Yuan Huang, Elham Erfani, Sensen Li, David Munzer, Matthieu R Bloch, and Hua Wang. A 25--34-ghz eight-element MIMO transmitter for keyless high throughput directionally secure communication. IEEE Journal of Solid-State Circuits, 57(5):1244--1256, 2021.
[21]
Kartik Patel, Nitin Jonathan Myers, and Robert W Heath. Circulant shift-based beamforming for secure communication with low-resolution phased arrays. IEEE Transactions on Wireless Communications, 2022.
[22]
Nachiappan Valliappan, Angel Lozano, and Robert W Heath. Antenna subset modulation for secure millimeter-wave wireless communication. IEEE Transactions on communications, 61(8):3231--3245, 2013.
[23]
Nafel N Alotaibi and Khairi Ashour Hamdi. Switched phased-array transmission architecture for secure millimeter-wave wireless communication. IEEE Transactions on Communications, 64(3):1303--1312, 2016.
[24]
Mohammed E Eltayeb, Junil Choi, Tareq Y Al-Naffouri, and Robert W Heath. Enhancing secrecy with multiantenna transmission in millimeter wave vehicular communication systems. IEEE Transactions on Vehicular Technology, 66(9):8139--8151, 2017.
[25]
Aydin Babakhani, David B Rutledge, and Ali Hajimiri. Transmitter architectures based on near-field direct antenna modulation. IEEE Journal of Solid-State Circuits, 43(12):2674--2692, 2008.
[26]
Michael P Daly and Jennifer T Bernhard. Directional modulation technique for phased arrays. IEEE Transactions on Antennas and Propagation, 57(9):2633--2640, 2009.
[27]
Suresh Venkatesh, Xuyang Lu, Bingjun Tang, and Kaushik Sengupta. Secure space-time-modulated millimetre-wave wireless links that are resilient to distributed eavesdropper attacks. Nature Electronics, 4(11):827--836, 2021.
[28]
Ying Ju, Yanzi Zhu, Hui-Ming Wang, Qingqi Pei, and Haitao Zheng. Artificial noise hopping: A practical secure transmission technique with experimental analysis for millimeter wave systems. IEEE Systems Journal, 14(4):5121--5132, 2020.
[29]
Xinyi Li, Chao Feng, Fengyi Song, Chenghan Jiang, Yangfan Zhang, Ke Li, Xinyu Zhang, and Xiaojiang Chen. Protego: securing wireless communication via programmable metasurface. In Proceedings of the 28th Annual International Conference on Mobile Computing And Networking, pages 55--68, 2022.
[30]
Chao Feng, Xinyi Li, Yangfan Zhang, Xiaojing Wang, Liqiong Chang, Fuwei Wang, Xinyu Zhang, and Xiaojiang Chen. Rflens: metasurface-enabled beamforming for iot communication and sensing. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, pages 587--600, 2021.
[31]
Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 128--139, 2008.
[32]
Shyamnath Gollakota and Dina Katabi. Physical layer wireless security made fast and channel independent. In 2011 Proceedings IEEE INFOCOM, pages 1125--1133. IEEE, 2011.
[33]
Narendra Anand, Sung-Ju Lee, and Edward W Knightly. Strobe: Actively securing wireless communications using zero-forcing beam-forming. In 2012 Proceedings IEEE INFOCOM, pages 720--728. IEEE, 2012.
[34]
Haitham Hassanieh, Jue Wang, Dina Katabi, and Tadayoshi Kohno. Securing RFIDs by randomizing the modulation and channel. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15), pages 235--249, 2015.
[35]
Christina Garman, Matthew Green, Gabriel Kaptchuk, Ian Miers, and Michael Rushanan. Dancing on the lip of the volcano: Chosen cipher-text attacks on apple imessage. In USENIX Security Symposium, pages 655--672, 2016.
[36]
Simon Erni, Martin Kotuliak, Patrick Leu, Marc Roeschlin, and Srdjan Capkun. Adaptover: adaptive overshadowing attacks in cellular networks. In Proceedings of the 28th Annual International Conference on Mobile Computing And Networking, pages 743--755, 2022.
[37]
Xu Zhang and Edward W Knightly. CSIsnoop: Attacker inference of channel state information in multi-user WLANs. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017.
[38]
Arunabha Ghosh, Jun Zhang, Jeffrey G Andrews, and Rias Muhamed. Fundamentals of LTE. Pearson Education, 2010.
[39]
Xiufeng Xie, Xinyu Zhang, and Karthikeyan Sundaresan. Adaptive feedback compression for MIMO networks. In Proceedings of the 19th annual international conference on Mobile computing & networking, pages 477--488, 2013.
[40]
Clayton Shepard, Hang Yu, Narendra Anand, Erran Li, Thomas Marzetta, Richard Yang, and Lin Zhong. Argos: Practical many-antenna base stations. In Proceedings of the 18th annual international conference on Mobile computing and networking, pages 53--64, 2012.
[41]
Paul H Moose. A technique for orthogonal frequency division multiplexing frequency offset correction. IEEE Transactions on communications, 42(10):2908--2914, 1994.
[42]
John Terry and Juha Heiskala. OFDM wireless LANs: A theoretical and practical guide. Sams publishing, 2002.
[43]
Ehsan Aryafar, Narendra Anand, Theodoros Salonidis, and Edward W Knightly. Design and experimental evaluation of multi-user beam-forming in wireless LANs. In Proceedings of the sixteenth annual international conference on Mobile computing and networking, pages 197--208, 2010.
[44]
Renew wireless wikipage. https://wiki.renew-wireless.org/.
[45]
Skylark wireless. https://skylarkwireless.com/products/infrastructure/.
[46]
Clayton Shepard, Josh Blum, Ryan E Guerra, Rahman Doost-Mohammady, and Lin Zhong. Design and implementation of scalable massive-MIMO networks. In Proceedings of the 1st International Workshop on Open Software Defined Wireless Networks, 2020.
[47]
Joao Vieira, Fredrik Rusek, Ove Edfors, Steffen Malkowsky, Liang Liu, and Fredrik Tufvesson. Reciprocity calibration for massive MIMO: Proposal, modeling, and validation. IEEE Transactions on Wireless Communications, 16(5):3042--3056, 2017.
[48]
Jian Ding, Rahman Doost-Mohammady, Anuj Kalia, and Lin Zhong. Agora: Real-time massive MIMO baseband processing in software. In Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies, pages 232--244, 2020.
[49]
Spdlog github repository. https://github.com/gabime/spdlog.
[50]
Cristian Rusu, Nuria González-Prelcic, and Robert W Heath. An attack on antenna subset modulation for millimeter wave communication. In 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pages 2914--2918. IEEE, 2015.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ACM MobiCom '23: Proceedings of the 29th Annual International Conference on Mobile Computing and Networking
October 2023
1605 pages
ISBN:9781450399906
DOI:10.1145/3570361
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 October 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. wireless security
  2. eavesdropping
  3. physical layer security
  4. secure beamforming
  5. artificial fast fading
  6. massive MIMO

Qualifiers

  • Research-article

Funding Sources

Conference

ACM MobiCom '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 364
    Total Downloads
  • Downloads (Last 12 months)254
  • Downloads (Last 6 weeks)67
Reflects downloads up to 04 Jan 2025

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media