Noah: Keyed noise flooding for wireless confidentiality

Sang Yoon Chang, Jemin Lee, Yih Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cryptographic protocols for confidentiality are oblivious to the unique challenges and advantages that wireless communication presents, mainly due to the open and public medium. We design a protocol at the wireless-specific physical and link layers and build a system that is information-theoretically secure against eavesdropping. Leveraging both friendly jamming and signal cancellation, Noah offers a novel keyed noise ooding protocol for wireless confidentiality. In contrast to prior work in wireless security, Noah protocol and its security properties are independent of the individual receiver's channel and do not require the channel link information (such as the channel condition and the antenna location) on the transmitter side. Thus, Noah supports multicast, taking advantage of the inherent broadcast nature of wireless medium, and defeats advanced channel-controlling eavesdroppers by making it impossible to physically separate the transmission and jamming. In this paper, we present the Noah protocol and provide fundamental insights in jamming and rate control for designing Noah.

Original languageEnglish (US)
Title of host publicationQ2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks
PublisherAssociation for Computing Machinery, Inc
Pages141-148
Number of pages8
ISBN (Electronic)9781450337571
DOIs
StatePublished - Nov 2 2015
Event11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2015 - Cancun, Mexico
Duration: Nov 2 2015Nov 6 2015

Publication series

NameQ2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks

Other

Other11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2015
CountryMexico
CityCancun
Period11/2/1511/6/15

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Noah: Keyed noise flooding for wireless confidentiality'. Together they form a unique fingerprint.

Cite this