Noah: Keyed noise flooding for wireless confidentiality

Sang Yoon Chang, Jemin Lee, Yih Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Cryptographic protocols for confidentiality are oblivious to the unique challenges and advantages that wireless communication presents, mainly due to the open and public medium. We design a protocol at the wireless-specific physical and link layers and build a system that is information-theoretically secure against eavesdropping. Leveraging both friendly jamming and signal cancellation, Noah offers a novel keyed noise ooding protocol for wireless confidentiality. In contrast to prior work in wireless security, Noah protocol and its security properties are independent of the individual receiver's channel and do not require the channel link information (such as the channel condition and the antenna location) on the transmitter side. Thus, Noah supports multicast, taking advantage of the inherent broadcast nature of wireless medium, and defeats advanced channel-controlling eavesdroppers by making it impossible to physically separate the transmission and jamming. In this paper, we present the Noah protocol and provide fundamental insights in jamming and rate control for designing Noah.

Original languageEnglish (US)
Title of host publicationQ2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks
PublisherAssociation for Computing Machinery, Inc
Pages141-148
Number of pages8
ISBN (Electronic)9781450337571
DOIs
StatePublished - Nov 2 2015
Event11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2015 - Cancun, Mexico
Duration: Nov 2 2015Nov 6 2015

Publication series

NameQ2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks

Other

Other11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2015
CountryMexico
CityCancun
Period11/2/1511/6/15

Fingerprint

Jamming
Telecommunication links
Transmitters
Antennas
Communication

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Cite this

Chang, S. Y., Lee, J., & Hu, Y. C. (2015). Noah: Keyed noise flooding for wireless confidentiality. In Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks (pp. 141-148). (Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks). Association for Computing Machinery, Inc. https://doi.org/10.1145/2815317.2815329

Noah : Keyed noise flooding for wireless confidentiality. / Chang, Sang Yoon; Lee, Jemin; Hu, Yih Chun.

Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Association for Computing Machinery, Inc, 2015. p. 141-148 (Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chang, SY, Lee, J & Hu, YC 2015, Noah: Keyed noise flooding for wireless confidentiality. in Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Association for Computing Machinery, Inc, pp. 141-148, 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet 2015, Cancun, Mexico, 11/2/15. https://doi.org/10.1145/2815317.2815329
Chang SY, Lee J, Hu YC. Noah: Keyed noise flooding for wireless confidentiality. In Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Association for Computing Machinery, Inc. 2015. p. 141-148. (Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks). https://doi.org/10.1145/2815317.2815329
Chang, Sang Yoon ; Lee, Jemin ; Hu, Yih Chun. / Noah : Keyed noise flooding for wireless confidentiality. Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Association for Computing Machinery, Inc, 2015. pp. 141-148 (Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks).
@inproceedings{6ebfaf3feb0e458fbb88309ee465a884,
title = "Noah: Keyed noise flooding for wireless confidentiality",
abstract = "Cryptographic protocols for confidentiality are oblivious to the unique challenges and advantages that wireless communication presents, mainly due to the open and public medium. We design a protocol at the wireless-specific physical and link layers and build a system that is information-theoretically secure against eavesdropping. Leveraging both friendly jamming and signal cancellation, Noah offers a novel keyed noise ooding protocol for wireless confidentiality. In contrast to prior work in wireless security, Noah protocol and its security properties are independent of the individual receiver's channel and do not require the channel link information (such as the channel condition and the antenna location) on the transmitter side. Thus, Noah supports multicast, taking advantage of the inherent broadcast nature of wireless medium, and defeats advanced channel-controlling eavesdroppers by making it impossible to physically separate the transmission and jamming. In this paper, we present the Noah protocol and provide fundamental insights in jamming and rate control for designing Noah.",
author = "Chang, {Sang Yoon} and Jemin Lee and Hu, {Yih Chun}",
year = "2015",
month = "11",
day = "2",
doi = "10.1145/2815317.2815329",
language = "English (US)",
series = "Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks",
publisher = "Association for Computing Machinery, Inc",
pages = "141--148",
booktitle = "Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks",

}

TY - GEN

T1 - Noah

T2 - Keyed noise flooding for wireless confidentiality

AU - Chang, Sang Yoon

AU - Lee, Jemin

AU - Hu, Yih Chun

PY - 2015/11/2

Y1 - 2015/11/2

N2 - Cryptographic protocols for confidentiality are oblivious to the unique challenges and advantages that wireless communication presents, mainly due to the open and public medium. We design a protocol at the wireless-specific physical and link layers and build a system that is information-theoretically secure against eavesdropping. Leveraging both friendly jamming and signal cancellation, Noah offers a novel keyed noise ooding protocol for wireless confidentiality. In contrast to prior work in wireless security, Noah protocol and its security properties are independent of the individual receiver's channel and do not require the channel link information (such as the channel condition and the antenna location) on the transmitter side. Thus, Noah supports multicast, taking advantage of the inherent broadcast nature of wireless medium, and defeats advanced channel-controlling eavesdroppers by making it impossible to physically separate the transmission and jamming. In this paper, we present the Noah protocol and provide fundamental insights in jamming and rate control for designing Noah.

AB - Cryptographic protocols for confidentiality are oblivious to the unique challenges and advantages that wireless communication presents, mainly due to the open and public medium. We design a protocol at the wireless-specific physical and link layers and build a system that is information-theoretically secure against eavesdropping. Leveraging both friendly jamming and signal cancellation, Noah offers a novel keyed noise ooding protocol for wireless confidentiality. In contrast to prior work in wireless security, Noah protocol and its security properties are independent of the individual receiver's channel and do not require the channel link information (such as the channel condition and the antenna location) on the transmitter side. Thus, Noah supports multicast, taking advantage of the inherent broadcast nature of wireless medium, and defeats advanced channel-controlling eavesdroppers by making it impossible to physically separate the transmission and jamming. In this paper, we present the Noah protocol and provide fundamental insights in jamming and rate control for designing Noah.

UR - http://www.scopus.com/inward/record.url?scp=84958535432&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84958535432&partnerID=8YFLogxK

U2 - 10.1145/2815317.2815329

DO - 10.1145/2815317.2815329

M3 - Conference contribution

AN - SCOPUS:84958535432

T3 - Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks

SP - 141

EP - 148

BT - Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks

PB - Association for Computing Machinery, Inc

ER -