Channel Camouflage and Manipulation Techniques in Wireless Networks

The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier...

Full description

Bibliographic Details
Main Author: Fang, Song
Format: Others
Published: Scholar Commons 2018
Subjects:
Online Access:https://scholarcommons.usf.edu/etd/7284
https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8481&context=etd
id ndltd-USF-oai-scholarcommons.usf.edu-etd-8481
record_format oai_dc
spelling ndltd-USF-oai-scholarcommons.usf.edu-etd-84812019-10-04T05:04:17Z Channel Camouflage and Manipulation Techniques in Wireless Networks Fang, Song The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier wavelength over distance. This property has prompted an emerging research area that utilizes wireless channel characteristics to achieve location distinction, to detect location changes or facilitate authentication of wireless users, and to establish shared secret key between legitimate communicators. This dissertation includes two work toward the security improvement of existing wireless networks and systems. With the discovered channel camouflage and manipulation techniques in wireless networks, traditional wireless channel based authentication or secure communication systems are broke or renovated. The first work proposes a new attack against all existing location distinction approaches that are built on this spatial uncorrelation property. With the discovered attack, an attacker can easily bypass authentication or camouflage location changes by creating an artificial wireless channel similar to a legitimate one. This dissertation also presents a detection technique that utilizes an auxiliary receiver or antenna to identify these fake channels. On the other hand, the second work shows that the legitimate users can also benefit from constructing these artificial wireless channels and apply them in a novel wireless key establishment. The proposed technique enables the transmitter to specify any content as the secret key and securely deliver it to the target receiver, and meanwhile removes the reconciliation process which is necessary for conventional wireless key establishment schemes. 2018-06-27T07:00:00Z text application/pdf https://scholarcommons.usf.edu/etd/7284 https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8481&context=etd Graduate Theses and Dissertations Scholar Commons Channel Impulse Response Key Establishment Location Distinction Entrapment Computer Engineering Computer Sciences
collection NDLTD
format Others
sources NDLTD
topic Channel Impulse Response
Key Establishment
Location Distinction
Entrapment
Computer Engineering
Computer Sciences
spellingShingle Channel Impulse Response
Key Establishment
Location Distinction
Entrapment
Computer Engineering
Computer Sciences
Fang, Song
Channel Camouflage and Manipulation Techniques in Wireless Networks
description The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier wavelength over distance. This property has prompted an emerging research area that utilizes wireless channel characteristics to achieve location distinction, to detect location changes or facilitate authentication of wireless users, and to establish shared secret key between legitimate communicators. This dissertation includes two work toward the security improvement of existing wireless networks and systems. With the discovered channel camouflage and manipulation techniques in wireless networks, traditional wireless channel based authentication or secure communication systems are broke or renovated. The first work proposes a new attack against all existing location distinction approaches that are built on this spatial uncorrelation property. With the discovered attack, an attacker can easily bypass authentication or camouflage location changes by creating an artificial wireless channel similar to a legitimate one. This dissertation also presents a detection technique that utilizes an auxiliary receiver or antenna to identify these fake channels. On the other hand, the second work shows that the legitimate users can also benefit from constructing these artificial wireless channels and apply them in a novel wireless key establishment. The proposed technique enables the transmitter to specify any content as the secret key and securely deliver it to the target receiver, and meanwhile removes the reconciliation process which is necessary for conventional wireless key establishment schemes.
author Fang, Song
author_facet Fang, Song
author_sort Fang, Song
title Channel Camouflage and Manipulation Techniques in Wireless Networks
title_short Channel Camouflage and Manipulation Techniques in Wireless Networks
title_full Channel Camouflage and Manipulation Techniques in Wireless Networks
title_fullStr Channel Camouflage and Manipulation Techniques in Wireless Networks
title_full_unstemmed Channel Camouflage and Manipulation Techniques in Wireless Networks
title_sort channel camouflage and manipulation techniques in wireless networks
publisher Scholar Commons
publishDate 2018
url https://scholarcommons.usf.edu/etd/7284
https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8481&context=etd
work_keys_str_mv AT fangsong channelcamouflageandmanipulationtechniquesinwirelessnetworks
_version_ 1719260267083202560