Abstract:
A real-time capable, protocol-aware, reactive jammer using GNU Radio and the USRP N210 software-defined radio (SDR) platform detects in-flight packets of known wireless standards and reacts to jam them—within 80 ns of detecting the signal. A reactive jamming device is achieved using low-cost, readily available hardware. The real-time reactive jamming device includes a real-time signal detector that detects an event in received packets in the wireless network, a reactive jamming device that sends a triggering signal when the event is detected, and a jamming generator responsive to the triggering signal to generate a jamming signal that has a user-defined delay so as to enable jamming of specific locations in received packets in the wireless network. The effects of three types of jamming on WiFi (802.11g) and mobile WiMAX (802.16e) networks are demonstrated and jamming performances are quantified by measuring the network throughput using the iperf software tool.
Abstract:
Symmetric keys are generated by an algorithm that uses the randomness from the wireless PHY layer to extract the keys. When used with reconfigurable antennas, the algorithm yields longer keys. By using the randomness from the wireless PITY layer, the algorithm solves the issue of secure information leakage to the wireless channel during key establishment phase. The algorithm also omits transmitting anything secure during this phase and prevents any intruder from obtaining information related to the key. This approach can automatically secure the communications over open wireless networks (those without authentication or encryption) or closed wireless networks using other methods of authentication.
Abstract:
A reactive jamming software defined radio (SDR) apparatus to target Frequency Hopping Spread-Spectrum (FHSS) signals includes a peripheral module for SDR processing; a reactive jamming hardware IP core that implements time-sensitive operations on a field programmable gate array (FGPA); and a host computer that implements non-time-critical operations, such as jammer configuration, logging, and strategy composition.
Abstract:
A key-based interleaver for enhancement the security of wireless communication includes a physical layer communication channel key to provide security even when the software encryption key is compromised. A method of creating a secure communication link using a physical layer interleaving system includes implementing a key policy implementation that utilizes temporal dependency and interleaving bits using a flexible inter and intra-block data interleaver.
Abstract:
Presenting a visualization of antenna radiation patterns may include sending a request to a server for up-to-date information regarding an antenna mode; receiving the request at the server and reading a register value for the antenna mode; responding, by the server, with updated antenna mode information; and overlaying antenna radiation patterns on an image based on the mode information.
Abstract:
A key-based interleaver for enhancement the security of wireless communication includes a physical layer communication channel key to provide security even when the software encryption key is compromised. A method of creating a secure communication link using a physical layer interleaving system includes implementing a key policy implementation that utilizes temporal dependency and interleaving bits using a flexible inter and intra-block data interleaver.
Abstract:
A reactive jamming software defined radio (SDR) apparatus to target Frequency Hopping Spread-Spectrum (FHSS) signals includes a peripheral module for SDR processing; a reactive jamming hardware IP core that implements time-sensitive operations on a field programmable gate array (FGPA); and a host computer that implements non-time-critical operations, such as jammer configuration, logging, and strategy composition.
Abstract:
Symmetric keys are generated by an algorithm that uses the randomness from the wireless PHY layer to extract the keys. When used with reconfigurable antennas, the algorithm yields longer keys. By using the randomness from the wireless PHY layer, the algorithm solves the issue of secure information leakage to the wireless channel during key establishment phase. The algorithm also omits transmitting anything secure during this phase and prevents any intruder from obtaining information related to the key. This approach can automatically secure the communications over open wireless networks (those without authentication or encryption) or closed wireless networks using other methods of authentication.
Abstract:
A physical layer based technique secures wireless communication between a transmitter and receiver. The technique involves obfuscating the preamble data of the baseband signal through unique keys that are generated at the transmitter and the receiver based on channel characteristics known only to them.
Abstract:
Presenting a visualization of antenna radiation patterns may include sending a request to a server for up-to-date information regarding an antenna mode; receiving the request at the server and reading a register value for the antenna mode; responding, by the server, with updated antenna mode information; and overlaying antenna radiation patterns on an image based on the mode information.