Channel Camouflage and Manipulation Techniques in Wireless Networks
The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier...
Main Author: | |
---|---|
Format: | Others |
Published: |
Scholar Commons
2018
|
Subjects: | |
Online Access: | https://scholarcommons.usf.edu/etd/7284 https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8481&context=etd |
id |
ndltd-USF-oai-scholarcommons.usf.edu-etd-8481 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-USF-oai-scholarcommons.usf.edu-etd-84812019-10-04T05:04:17Z Channel Camouflage and Manipulation Techniques in Wireless Networks Fang, Song The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier wavelength over distance. This property has prompted an emerging research area that utilizes wireless channel characteristics to achieve location distinction, to detect location changes or facilitate authentication of wireless users, and to establish shared secret key between legitimate communicators. This dissertation includes two work toward the security improvement of existing wireless networks and systems. With the discovered channel camouflage and manipulation techniques in wireless networks, traditional wireless channel based authentication or secure communication systems are broke or renovated. The first work proposes a new attack against all existing location distinction approaches that are built on this spatial uncorrelation property. With the discovered attack, an attacker can easily bypass authentication or camouflage location changes by creating an artificial wireless channel similar to a legitimate one. This dissertation also presents a detection technique that utilizes an auxiliary receiver or antenna to identify these fake channels. On the other hand, the second work shows that the legitimate users can also benefit from constructing these artificial wireless channels and apply them in a novel wireless key establishment. The proposed technique enables the transmitter to specify any content as the secret key and securely deliver it to the target receiver, and meanwhile removes the reconciliation process which is necessary for conventional wireless key establishment schemes. 2018-06-27T07:00:00Z text application/pdf https://scholarcommons.usf.edu/etd/7284 https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8481&context=etd Graduate Theses and Dissertations Scholar Commons Channel Impulse Response Key Establishment Location Distinction Entrapment Computer Engineering Computer Sciences |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Channel Impulse Response Key Establishment Location Distinction Entrapment Computer Engineering Computer Sciences |
spellingShingle |
Channel Impulse Response Key Establishment Location Distinction Entrapment Computer Engineering Computer Sciences Fang, Song Channel Camouflage and Manipulation Techniques in Wireless Networks |
description |
The security of wireless networks and systems is becoming increasingly important as wireless devices are more and more ubiquitous nowadays. The wireless channel exhibits the spatial uncorrelation property, which is that the characteristics of a wireless channel become uncorrelated every half carrier wavelength over distance. This property has prompted an emerging research area that utilizes wireless channel characteristics to achieve location distinction, to detect location changes or facilitate authentication of wireless users, and to establish shared secret key between legitimate communicators. This dissertation includes two work toward the security improvement of existing wireless networks and systems. With the discovered channel camouflage and manipulation techniques in wireless networks, traditional wireless channel based authentication or secure communication systems are broke or renovated.
The first work proposes a new attack against all existing location distinction approaches that are built on this spatial uncorrelation property. With the discovered attack, an attacker can easily bypass authentication or camouflage location changes by creating an artificial wireless channel similar to a legitimate one. This dissertation also presents a detection technique that utilizes an auxiliary receiver or antenna to identify these fake channels.
On the other hand, the second work shows that the legitimate users can also benefit from constructing these artificial wireless channels and apply them in a novel wireless key establishment. The proposed technique enables the transmitter to specify any content as the secret key and securely deliver it to the target receiver, and meanwhile removes the reconciliation process which is necessary for conventional wireless key establishment schemes. |
author |
Fang, Song |
author_facet |
Fang, Song |
author_sort |
Fang, Song |
title |
Channel Camouflage and Manipulation Techniques in Wireless Networks |
title_short |
Channel Camouflage and Manipulation Techniques in Wireless Networks |
title_full |
Channel Camouflage and Manipulation Techniques in Wireless Networks |
title_fullStr |
Channel Camouflage and Manipulation Techniques in Wireless Networks |
title_full_unstemmed |
Channel Camouflage and Manipulation Techniques in Wireless Networks |
title_sort |
channel camouflage and manipulation techniques in wireless networks |
publisher |
Scholar Commons |
publishDate |
2018 |
url |
https://scholarcommons.usf.edu/etd/7284 https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=8481&context=etd |
work_keys_str_mv |
AT fangsong channelcamouflageandmanipulationtechniquesinwirelessnetworks |
_version_ |
1719260267083202560 |