谷歌浏览器插件
订阅小程序
在清言上使用

Mapping Obfuscation-Based PHY Security Scheme for Resource-Constrained Wireless Sensor Network

IETE TECHNICAL REVIEW(2021)

引用 1|浏览3
暂无评分
摘要
Wireless sensor network (WSN) physical layer (PHY) uses M-ary spread spectrum (MaSS). This paper explores MaSS and emphasizes that based on the implementation approach; the technology has the potential to provide security at the PHY of wireless devices. The MaSS parameters, namely, spreading sequences and symbol to sequence mapping logic, can be obfuscated for security implementation. In this paper, we have focused our analysis on obfuscating mapping logic, i.e. Mapping Obfuscation (MO). Mathematical analysis reveals that an eavesdropper with processing speed in the order of 10(18) operations/sec can intercept and decode short length (maximum 8-10 bytes) packets in <100 s. Simulation exposes that the eavesdropper can achieve a success rate of 50% for short-length packets if its signal-to-noise ratio exceeds -1 dB. An attacker has only one check metric for mapping sequence detection that is correct frame check sequence (FCS) detection. However, FCS detection may be misleading; if packet-embedded FCS and eavesdropper-generated FCS are the same for the wrong mapping sequence. For MO-based MaSS, false FCS detection probability is 30 times more than valid FCS detection probability. To reduce false FCS probability attacker need to analyse multiple radio frequency (RF) packets for detecting a valid mapping key; this increases the computation time. For MO-based PHY security, correct mapping sequence identification by exhaustive search demands cluster-based parallel processing.
更多
查看译文
关键词
Direct sequence spread spectrum,Eavesdropping,Mapping,Obfuscation,Physical layer security,Spreading,Wireless sensor network
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要