A Framework for MIMO-based Packet Header Obfuscation

نویسندگان

  • Yue Cao
  • Ahmed O. F. Atya
  • Shailendra Singh
  • Zhiyun Qian
  • Srikanth V. Krishnamurthy
  • Thomas La Porta
  • Prashant Krishnamurthy
  • Lisa Marvel
چکیده

Eavesdroppers can exploit exposed packet headers towards attacks that profile clients and their data flows. In this paper, we propose FOG, a framework for effective header blinding using MIMO, to thwart eavesdroppers. FOG effectively tracks header bits as they traverse physical (PHY) layer sub-systems that perform functions like scrambling and interleaving. It combines multiple blinding signals for more effective and less predictable obfuscation, as compared to using a fixed blinding signal. We implement FOG on the WARP platform and demonstrate via extensive experiments that it yields better obfuscation than prior schemes that deploy full packet blinding. It causes a bit error rate (BER) of > 40 % at an eavesdropper if two blinding streams are sent during header transmissions. Furthermore, FOG incurs a very small throughput hit of ≈ 5 % with one blinding stream (and 9 % with two streams). Full packet blinding incurs much higher throughput hits (25 % with one stream and 50 % with two streams).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless Communication Security Through Symbol Obfuscation in Physical Layer

Secure communication is a critical and challenging issue in wireless networks. To achieve the information theoretic secrecy the leading approach is artificial noisy symbol. The basic idea in this paper is enhancing the security in wireless communication. Multiple Inter-symbol Obfuscation(MIO) method will be deployed in the physical layer. MIO is a method for transferring the data and it provide...

متن کامل

Frame-Based MIMO-OFDM Systems: Impairment Estimation and Compensation

Multi-antenna systems that use orthogonal frequency division multiplexing (MIMO-OFDM) are considered to be employed in future wireless local area networks (WLAN). When implementing such systems covering all aspects from analog signal conditioning to digital baseband processing, non-idealities appear that deviate considerably from idealized assumptions often found in literature. Impairments such...

متن کامل

Practical Data Hiding in TCP/IP

This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. Two approaches are proposed based on packet header manipulation and packet ordering within the IPSec framework. For the former the Internet protocol IPv4 header is analyzed to identify covert channels by exploiting redundancy and multiple interpretat...

متن کامل

Packet Filter Management for Layer 4 Switching

Packet lters are rules for classifying packets based on their header elds. A lter speciies a pattern for each of the key header elds, and an action that is applied to the packet matching this lter. Packet classiication is essential to routers supporting services such as Quality of Service (QoS), Virtual Private Networks (VPNs), and rewalls. A lter connict occurs when two or more lters overlap, ...

متن کامل

An Information Theoretic Approach to Network Trace Compression

In this paper, we propose an information theoretic framework within which to study the redundancy present in packet header traces. Packet level and flow level models are developed that capture both temporal and spatial correlation present in packet headers, which can be exploited for packet trace compression. Information theoretic bounds are established for lossless packet header compression. D...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017