Abstract
Interleavers are typically used to distribute burst of errors, so they appear as simple random errors. Alternatively, if interleaving patterns are kept secure, then these patterns can be introduced as a physical (PHY) layer security device. In this paper, an efficient technique to introduce security at physical (PHY) layer is proposed to enhance the security of 802.11i, which is designed to improve the security at medium access control. Since it does not emphasize on availability therefore several denial of service (DoS) attacks are possible. The DoS attacks are easy to mount because management and control frames are unprotected and so are MAC headers. This paper proposes a secure seed based random interleaving technique to scramble the OFDM constellation symbols to encrypt data transmission to resist these malicious attacks. In order to analyze the suitability of proposed technique as PHY layer security device keysensitivity analysis is carried out. The scrambling is completely reversible with the use of appropriate key. However, use of a wrong initial condition even at 4th decimal point produces entirely different sequence resulting in erroneous constellations with equal probability. To analyze the effectiveness of proposed technique various security attacks are analyzed in detail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Liu, C., Yu, J.: A Solution to WLAN Authentication and Association DoS Attacks. IAENG International Journal of Computer Science 34(1) (2007)
Malekzadeh, M., Abdul Ghani, A.A., Ahmad Zulkarnain, Z., Muda, Z.: Security Improvement for Management Frames in IEEE 802.11 Wireless Networks. IJCSNS International Journal of Computer Science and Network Security 7(6) (June 2007)
Asif Khan, M., Asim, M., Jeoti, V.: Chaos Based Constellation Scrambling: Security and Interleaving Issues. In: ITSIM 2008, pp. 1–7 (August 26-28, 2008) ISBN: 978-1-4244-2327-9
Hiltunen, K.: WLAN attacks and risks, http://www.comlab.hut.fi/opetus/333/2004slides/topic30.pdf
Xiao, Y., Pan, Y., Du, X., Bandela, C., Dass, K.: Security mechanism, attacks, and security enhancements for the IEEE 802.11 WLANs. International Journal of Wireless and Mobile Computing, special issue on Medium Access Control for WLANs, PANs and Sensor Network 1(3/4), 276–288 (2005)
He, C., Mitchell, J.C.: Security analysis and improvements for 802.11i. In: The 12th Annual Network and Distributed System Security Symposium, NDSS 2005, pp. 90–110 (February 2005)
Baranovsky, A., Daems, D.: The design of one dimensional chaotic maps with prescribed statistical properties. International Journal of Bifurcation of Chaos & Fractals 5(6) (1995)
Asim, M., Jeoti, V.: Hybrid chaotic image encryption scheme based on S-box and ciphertext feedback. In: IEEE International Conference on Intelligent and Advanced Systems, pp. 736–741 (November 2007) ISBN: 978-1-4244-1355-3
Asif Khan, M.: A Novel Seed Based Random Interleaver Design for OFDM System and its PHY layer Security Issues, Master’s Thesis, Universiti Teknologi PETRONAS (2009)
Bellardo, J., Savage, S.: 802.11 Denial-of-Service attacks: Real vulnerabilities and practical solution. In: Usenix Security Symposium, pp. 15–28 (August 4-8, 2003)
Liu, C., Yu, J.T.: Review and Analysis of Wireless LAN Security Attacks and Solutions. Journal of International Engineering Consortium 59, 539–554 (2006) ISBN: 978-1-931695-53-4
Liu, C., Yu, J.T.: An Analysis of DoS Attacks on Wireless LAN. In: IASTED International Conferences on Wireless Networks and Emerging Technologies (WNET 2006), Banff, Canada (2006)
Ding, P., Holliday, J., Celik, A.: Improving the Security of Wireless LANs by Managing 802.1X Disassociaion. In: Proceedings of the IEEE Consumer Communications and Networking Conference, Las Vegas, NV, pp. 53–58 (2004)
Grech, S., Nikkanen, J.: A Security Analysis of Wi-Fi Protected Access. In: The 9th Nordic Workshop on Secure IT-systems. Helsinki University of Technology, Finland (2004)
Ge, W., Sampalli, S.: A Novel Scheme For Prevention of Management Frame Attacks on Wireless LANs (2005)
Chen, D., Deng, J., Varshney, P.K.: Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming. In: ACM MobiCom 2003, Poster, San Diego, CA, USA (2003)
Gupta, V., Krishnamurthy, S., Faloutsos, M.: Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In: Proceedings of 2002 MILCOM Conference, vol. 2 (2002)
Vladimirov, A.A., Gavrilenko, K.V., Mikhailovsky, A.A., Wi-Foo: The Secrets of Wireless Hacking, pp. 159–195. Pearson/Addison Wesley (June 2004)
Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of the 802.1X Standard. University of Maryland, CS-TR-4328, UMIACS-TR-2002-10 (February 2002)
Walker, J.: Status of Project IEEE 802.11 Task Group w, Protected Management Frames (2007), http://grouper.ieee.org/groups/802/11/Reports/tgw_update.htm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Asif Khan, M., Jeoti, V., Shahid Manzoor, R. (2011). Secure Interleaving - Physical Layer Security Enhancement of OFDM Based System. In: Yonazi, J.J., Sedoyeka, E., Ariwa, E., El-Qawasmeh, E. (eds) e-Technologies and Networks for Development. ICeND 2011. Communications in Computer and Information Science, vol 171. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22729-5_30
Download citation
DOI: https://doi.org/10.1007/978-3-642-22729-5_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22728-8
Online ISBN: 978-3-642-22729-5
eBook Packages: Computer ScienceComputer Science (R0)