Secure LTF Using DFT Precoded OFDM for IEEE 802.11-20

july 2020 n.w
1 / 13
Embed
Share

Explore the secure transmission techniques in IEEE 802.11-20, focusing on Physical Layer attacks, Integrity Attack Scenarios, and types of attacks like Computational, Replay, and more. See how attackers manipulate measurements to compromise network security. Discover preventive measures and advancements in securing data transmission.

  • Secure LTF
  • DFT Precoded OFDM
  • Physical Layer Attacks
  • Integrity Attacks
  • IEEE 802.11-20

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. July, 2020 doc.: IEEE 802.11-20/1097r0 Secure LTF using DFT Precoded OFDM Date: 2020-07-15 Authors: Name Christian Berger Affiliations NXP Address 350 Holger Way, San Jose, CA Phone email christian.berger@nxp.com Submission Slide 1 Christian Berger (NXP)

  2. July, 2020 doc.: IEEE 802.11-20/1097r0 PHY Security Attacker tries to modify the measured range Make STA appear closer to AP to fake proximity detection Spoof time-stamps t2 or t4 to achieve that Focus on physical layer attack Assume that MAC level is authenticated/encrypted Includes time-stamps t1/t4 feedback to initiator VHT- STF VHT- SIG-B L-STF L-LTF L-SIG VHT-SIG-A VHT-LTF Data VHT-LTF Adversary Timing advance Submission Slide 2 Christian Berger (NXP)

  3. July, 2020 doc.: IEEE 802.11-20/1097r0 Integrity Attack Scenario First line security Use secure LTF (sequence unknown to attacker) Replace Cyclic Prefix (CP) with zero-padded Guard Interval (to reduce structure) Attack types 1. Computational attack: attacker observes fraction of symbol and predicts the rest to attack the later part Replay attack: for both Cyclic Prefix or Guard Interval, attacker repeats first quarter portion of secure LTF with offset Brute-force attack: attacker tries to guess the secure LTF Noise only: performance in low SNR or attacker caused SINR 2. 3. 4. Submission Slide 3 Christian Berger (NXP)

  4. July, 2020 doc.: IEEE 802.11-20/1097r0 Attacker Type 1 Computational Attack Attacker will listen to first half portion of LTF Then try to estimate the full time-domain LTF waveform (typically by estimating frequency QAM symbols) Change measured t2 or t4 by transmitting the last (estimated) quarter of time-domain LTF waveform with timing advance Waveform for channel measurement First half Timing advance Last quarter Waveform transmitted by attacker Submission Slide 4 Christian Berger (NXP)

  5. July, 2020 doc.: IEEE 802.11-20/1097r0 Attacker Type 2 Guard Interval (GI) Replay Attack Attacker will listen to first quarter portion of LTF Then try to change measured t2 or t4 by re-transmitting the first quarter with timing advance at the end Will affect overlap-add based receiver Waveform for channel measurement First quarter Timing advance Copy Waveform transmitted by attacker Submission Slide 5 Christian Berger (NXP)

  6. July, 2020 doc.: IEEE 802.11-20/1097r0 Attacker Type 4 Brute Force Attack Attacker will try to change measured t2 or t4 by guessing the secure LTF and transmitting with timing advance Attack efficacy depends on likelihood of high cross-correlation between sequences A and B Waveform for channel measurement LTF Sequence A Waveform transmitted by attacker Timing advance LTF Sequence B Submission Slide 6 Christian Berger (NXP)

  7. July, 2020 doc.: IEEE 802.11-20/1097r0 Attacker Type 4 Performance in Noise Even without an attacker the likelihood of triggering a false proximity detection increases with decreasing SNR Attacker can send interference to artificially lower SNR Used as a baseline to compare effectiveness of attacks Measures of PHY security If brute-force attack achieves no worse performance as noise-only If replay attack achieves no worse performance than brute-force Submission Slide 7 Christian Berger (NXP)

  8. July, 2020 doc.: IEEE 802.11-20/1097r0 Example: Computational Attack Setup 40 MHz, overlap-add receiver LTF with random QPSK symbols Observation period 50% Observations First half of time domain, contains information about all symbols Intercarrier-interference (ICI) between neighboring symbols Submission Slide 8 Christian Berger (NXP)

  9. July, 2020 doc.: IEEE 802.11-20/1097r0 DFT Precoded OFDM Overview Data symbols are precoded with a DFT matrix before IFFT processing Can be used with cyclic prefix or without Effectively Sinc interpolation of symbols instead of traditional pulse shaper Can also omit DC Christian Berger (NXP) Submission Slide 9

  10. July, 2020 doc.: IEEE 802.11-20/1097r0 Example of DFT Precoded LTF Setup Use VHT40 as example 128 QPSK symbols, DFT precoded Zero out 3 DC tones + guard bands Keep 114 non-zero subcarriers Submission Slide 10 Christian Berger (NXP)

  11. July, 2020 doc.: IEEE 802.11-20/1097r0 Example of DFT Precoded LTF Setup 40 MHz, overlap-add receiver LTF with DFT precoded random QPSK Observation period 50% Observations First half of time domain, contains little information about second half Only source is ICI between neighboring symbols (quickly decreasing) Submission Slide 11 Christian Berger (NXP)

  12. July, 2020 doc.: IEEE 802.11-20/1097r0 PAPR Comparison DFT Precoded OFDM Peaks up to 2x due to interpolation (same neighboring symbols) About 1 dB worse than Golay About 2-3 dB better than QPSK Submission Slide 12 Christian Berger (NXP)

  13. July, 2020 doc.: IEEE 802.11-20/1097r0 Conclusion Presented DFT Precoded OFDM for Secure LTF Requires extra FFT operation to populate subcarriers PAPR closer to frequency Golay sequences Attacker resilience Can be used without CP to avoid replay attack Large signal space to avoid brute force attack Low cross-correlation in time-domain prevents computational attack Submission Slide 13 Christian Berger (NXP)

Related


More Related Content