This application claims priority under 35 U.S.C. § 119 to Korean Provisional Application No. 10-2020-0172608, filed Dec. 10, 2020 in the Korean Intellectual Property Office, the content of which is incorporated herein by reference in its entirety.
The present disclosure relates generally to wireless communications security and more particularly to techniques for detecting spoofing and/or jamming attacks with respect to a wireless channel of a wireless communication system.
Physical layer security techniques have attracted significant attention as an option for securing wireless communications. A malicious attacker (“interferer”) may attempt to eavesdrop, access sensitive information, and/or disrupt communications between two wireless devices using, e.g., spoofing or jamming. In a spoofing attack known as pilot contamination (discussed in [1] of References section below), an interferer may attempt to improve a signal from the transmitting device towards the interferer and degrade the signal towards the legitimate user (LU) receiving device. To this end, the interferer may attempt to contaminate a pilot-based sounding/estimation procedure with respect to a wireless channel between the two devices. If successful, the transmitting device (e.g., an access point (AP) in WiFi, a master device in Bluetooth, or a base station in a cellular network) may be spoofed into using beamforming to orient its beam towards both the LU and the interferer.
In another attack category known as pilot jamming (discussed in [2]), the transmitted signal from the interferer transmits random noise with the purpose of degrading the signal reception at the LU. This may be done to maliciously degrade communications between the transmitting device and the LU, and/or cause either device to increase the power of its transmitted signal and thereby improve signal reception at the interferer.
Some methods designed to detect and handle such interferer attacks are as follows: In [3], a random training scheme is proposed to detect pilot contamination. The training signal is randomly chosen from a set of phase shift keying (PSK) symbols. This method, however, requires a fundamental change in the set of pilot signal designs as well as the channel estimation process, which is typically undesirable due to increased costs and incompatibility issues. In [4], an energy ratio detector is described to detect pilot contamination. The method assumes the spoofing attack will decrease the signal reception at the LU due to a transmit beamforming change. Thus, the detector explores asymmetry of received signal power levels at the beamformer and the LU. However, the method has the drawback of an additional signaling procedure. In [5], the pilot contamination and jamming are considered together with the LU randomly selecting a training signal from a pre-defined set with multiple orthogonal pilot sequences. This technique likewise consumes further resources associated with additional signaling.
Embodiments of the inventive concept may leverage the expected characteristics of a slowly changing propagation channel (a “static” channel) to detect, in real time or nearly real time, an opportunistic attack on the channel by an interferer device.
In an aspect of the inventive concept, a method is provided for detecting a modification, due to an interferer, of a wireless channel between a transmitting device and a receiving device. First and second samples of channel frequency response (CFR) of the wireless channel are measured within a time interval less than or equal to a pre-established static time interval. The static time interval is an interval throughout which the wireless channel is expected to exhibit a static characteristic in an environment without any interferer. The method detects that the interferer has modified the wireless channel when a similarity condition reflecting a degree of similarity between the first and second CFR samples is not satisfied.
Examples of developing the similarity condition and determining whether the similarity condition is satisfied include operations employing a cross-correlation algorithm; a nearest neighbor algorithm; and/or a supervised neural network.
In another aspect, a method for detecting a modification of a wireless channel includes a training phase in which a training procedure involves communicating training signals between transmitting and receiving devices at frequencies distributed over an operating frequency band in the absence of an interferer. At the receiving device, the training signals are sampled at each of the frequencies to obtain samples of channel frequency response (CFR) over time. A static time interval is determined based on the CFR samples. A CFR similarity condition is determined for a static characteristic of the wireless channel based on the CFR samples. During an operational phase, a modification of the wireless channel due to the interferer is detected when the CFR similarity condition is not satisfied with respect to CFR samples taken during a time interval less than or equal to the static time interval.
In yet another aspect, a receiving device includes at least one antenna; a transceiver; and at least one processor configured to execute any of the methods summarized above.
The above and other aspects and features of the disclosed technology will become more apparent from the following detailed description, taken in conjunction with the accompanying drawings in which like reference characters indicate like elements or features. Various elements of the same or similar type may be distinguished by annexing the reference label with a second label that distinguishes among the same/similar elements (e.g., 135_1, 135_2). However, if a given description uses only the first reference label (e.g., 135) it is applicable to any one of the same/similar elements having the same first reference label irrespective of the second label.
The following description, with reference to the accompanying drawings, is provided to assist in a comprehensive understanding of certain example embodiments of the inventive concept disclosed herein for illustrative purposes. The description includes various specific details to assist a person of ordinary skill in the art with understanding the inventive concept, but these details are to be regarded as merely illustrative. For the purposes of simplicity and clarity, descriptions of well-known functions and constructions may be omitted when their inclusion may obscure appreciation of the inventive concept by a person of ordinary skill in the art.
Existing interferer detection techniques such as those described in the Related Art discussion above may consider that the interferer is continually spoofing a channel sounding procedure (i.e., a propagation channel testing process) over a relatively long observation time. Embodiments of the inventive concept, on the other hand, consider the case in which an interferer attacks opportunistically—e.g., the interferer only transmits an interference signal sporadically over an observation time. In an example implementation within an indoor environment, the wireless propagation channel usually changes slowly when there is no active interferer. Such a slow changing channel may be said to have a “static characteristic” or to have a property of “channel continuality”. This property can be utilized in embodiments of the inventive concept to detect an interferer attack, the moment it occurs, when the channel estimate changes suddenly due to the attack.
Transmitting device 130 and/or receiving device 120 may include the capability to detect interferers according to methods described hereafter, and may generally be any devices capable of wirelessly communicating signals/information with each other, bidirectionally or unidirectionally. Transmitting device 130 may be a controlling device in system 100 that may communicate concurrently with multiple receiving devices 120. Some examples of transmitting device 130 include a master device in Bluetooth, an Access Point (AP) in WiFi, and a base station in a cellular network (sometimes called a node B or an eNode B). Receiving device 120 may be any device that operates according to the protocol of transmitting device 130. For instance, receiving device 120 may be configured as a slave device in Bluetooth, a station (STA) in WiFi, or a wireless terminal or “user device” in a cellular network. In peer-to-peer networks, some examples of a receiving device 120 may also include the capability of operating as a transmitting device 130, and vice versa. For simplicity of explanation in the discussion below, it will be assumed that transmitting device 130 is a controlling device in system 100, e.g., a device that transmits pilot signals enabling detection of its presence and availability by receiving device 120, provides synchronization signals to receiving device 120, assigns frequencies/time slots to receiving device 120, etc. Receiving device 120 may be assumed in the following discussion to operate with frequencies, time slots, power levels, etc. permitted under the control of transmitting device 130. Receiving device 120 may periodically transmit feedback signals back to transmitting device 130 to report propagation channel conditions based on measurements of training signals or traffic signals received from transmitting device 130. Receiving device 120 may be referred to as a legitimate user (LU).
Transmitting device 130 may include a single antenna 135 or multiple antennas 135_1 to 135_N (N=2 or more) for communication with receiving device 120. Transmitting device 130 may also communicate wirelessly or in a wired manner with a local area or wide area network 150 such as the Internet, to provide information to receiving device 120. In embodiments with multiple antennas 135_1 to 135_N, transmitting device 130 may include beamforming capability to drive the antennas 135_1 to 135_N together as a steerable phased array. Thus, a beam B is formed that may be steered 117 to optimize the signal power at receiving device 120. Receiving device 120 may similarly include just a single antenna 125, or in other cases, multiple antennas 125 that may also be driven together to form a steerable beam. (Transmitting and receiving devices 130 and 120, when equipped with multiple antennas, may additionally or alternatively be configured with a multiple input multiple output (MIMO) based feed network coupled to the antennas to transmit/receive signals over several multipath spatial channels concurrently.)
In accordance with some protocols, a pilot-based sounding/estimation procedure may be carried out with respect to the wireless propagation channel between transmitting and receiving devices 130 and 120. During this procedure, an interferer device 140 may initiate a “man in the middle attack”. For instance, if interferer device 140 launches a pilot contamination spoofing attack that goes undetected, transmitting device 130 may react by steering the beam B away from an optimal pointing direction at receiving device 120 and closer to interferer device 140. This may reduce power/quality of received signal at receiving device 120 and improve it at interferer device 140. Similarly, if interferer device 140 initiates a jamming attack by outputting a high noise level, signal reception at receiving device 120 may be degraded, which may cause transmitting device 130 to increase its signal power and thereby improve the signal towards interferer device 140. Embodiments described below may be designed to detect such attacks in real time or nearly real time, whereupon countermeasures may be promptly taken.
Training signals may first be communicated between transmitting device 130 and receiving device 120 in an environment without an interferer (operation S202). The training signals may be any known signals, such as pilot signals in WiFi or handshake signals in Bluetooth. These signals may be generated at frequencies distributed over an operating frequency band to be later used for control and traffic signals. The training signals, which may be modulated in the same manner as subsequent traffic/pilot/control signals, are transmitted from transmitting device 130 to receiving device 120, or vice versa. The training signals may be transmitted either at one carrier frequency at a time in a sequence, or, at two or more frequencies simultaneously by generating sub-carriers using an OFDM technique or the like. The received training signals may then be sampled at each of the frequencies to obtain samples of CFR over time (S204). For instance, in a WLAN application, one dimensional (1D) data signals (discussed later) may be obtained from CFR estimation using training symbols in an IEEE 802.11 WiFi preamble, such as L-LTF and VHT-LTF.
In an example, to ensure there is no interferer present, the training phase may be performed in an anechoic chamber or other shielded environment with a simulation of the actual application environment within which devices 120 and 130 communicate. The simulation may include movement of one or both devices 120 and 130 (relative to each other) and/or movement of objects situated between the devices 120, 130 at speeds consistent with the application, e.g., pedestrian speeds. The simulation may further include a transmission of interference signals towards device 120 and/or 130 emitted by an emulated interferer.
In other examples, it may be assumed that under certain conditions an interferer is not present in the actual operating environment of system 100, whereby the training phase may be performed during such a time. As one example, for the case where devices 120 and 130 are a key fob and a vehicle transceiver, respectively, or vice versa, it may be assumed that no interferer is present within a particular time after the vehicle has traveled and becomes parked, and that the training phase may be performed during that time.
The static time interval T same may be determined or obtained (S206). T same may be computed based on the training data, or alternatively obtained as a default value from memory. Herein, a static time interval is a time interval throughout which the wireless channel is expected to exhibit a “static characteristic” in the environment without an interferer. A “static characteristic” is a characteristic of a slowly changing channel, the metrics of which may vary from embodiment to embodiment and which may depend on the expected number and speed of objects/devices moving in the particular environment. For example, if wireless communication system 100 is set up in an indoor office environment, transmitting device 130 may be a Bluetooth master device such as a server or desktop computer, and receiving device 120 may be a slave device such as a printer, laptop, desktop computer, smartphone, etc. In a WiFi example, transmitting device 130 may be an AP such as a WiFi router and receiving device 120 is a STA, such as a smartphone, laptop, etc. In the office environment, a small number of people may intermittently walk back and forth through the propagation channel between devices 120 and 130 over a range of speeds, thereby intermittently changing the signal characteristics of the received signal at receiving device 120. In another application example, transmitting device 130 is a vehicle transceiver and receiving device 120 is a key fob (or vice versa) used for unlocking the vehicle, typically using Bluetooth communication. Whenever the key fob is in a certain range of the vehicle, the transceiver and key fob may continually exchange signals. In this case, when a person holding the key fob walks away from or towards the vehicle, the signal characteristics of the received signal at the key fob will change. Despite the intermittent changes in these and other examples, the propagation channel may be considered to have a static characteristic in the environment, where the metrics of the static characteristic, e.g., the range of received signal variables such as signal to noise ratio (SNR), may be learned from the samples of the received training signals. In other words, the static characteristic may be a characteristic definable by normal CFR variations in the absence of an interferer.
Accordingly, metrics for a static channel may be learned from the CFR samples. Data for metrics such as variation of power of received signal with time, variation in SNR with time, and/or variation in bit-to-error ratio (BER) with time, may be gathered based on the CFR samples. Maximum variation in these characteristics for the channel without an interferer may be learned, and this data may be used to determine T same. The CFR samples may also be used to determine a CFR similarity condition representing a high degree of similarity between consecutive CFR samples (S208). Similarity at or above the high degree of similarity corresponds to a static characteristic for the wireless channel. The similarity condition can be used later in the operational phase of the method (” for the interval T same may be determined for quantifying a static characteristic of the wireless channel over T same, based on the CFR samples (S208). The threshold
may be later used during normal data communication sessions (in the method of
In examples where T same is computed based upon the training data, the computation may consider an expected speed of objects moving between the transmitting and receiving devices 130, 120, and calculate a maximum Doppler frequency shift of signals reflected from objects. For instance, in an indoor office environment example, a maximum Doppler shift may be on the order of 7 Hz and T same may be on the order of tenths of a second. The algorithm may also consider relative motion between devices 130 and 120, and an expected communication range between the devices. For instance, an algorithm may assume a certain maximum relative motion between the devices at a pedestrian speed, such that the communication range between consecutive samples will change linearly as a function of the sampling interval. The algorithm may also assume the received signal level will change by a certain amount between the consecutive samples due to the change in range. In this scenario, if T same is set too long, the maximum expected change in signal level may be too high. Accordingly, T same may be set to a duration consistent with the expected speed of objects in the environment and/or the relative motion between the transmitting and receiving devices.
In some embodiments, the training phase further computes a time interval “T diff” and a metric “M diff” associated with an interferer. The interval T diff may represent a time in which a CFR difference between samples taken at an interval longer than T diff appears to have been caused by an interferer, if that CFR difference was actually measured within the interval T same. This may be better understood by considering the following example: in the case of a key fob communicating with a vehicle, the user may have placed the key fob inside a building, whereby the key fob is at a fixed range with respect to the vehicle transceiver and is in continual communication therewith. Thus, the CFR of consecutive signal samples should be highly correlated in the absence of an interferer. If, however, an interferer suddenly appears at a different distance with respect to the vehicle and mimics the signals transmitted by the key fob to gain access to the vehicle, the CFR difference between a first signal transmitted by the interferer, and a last signal transmitted by the key fob (as measured at the vehicle transceiver), will be significant. This considerable, sudden difference in CFR may be a catalyst to detect an interferer. The metric M diff may simulate such a CFR difference based on T diff. For example, if T diff is an interval set longer than T same, and a simulation is conducted in which a maximum relative motion between the two devices occurs for the time T diff, the CFR difference between samples taken T diff apart may be used to establish the metric M diff. Later, during the “operational phase” of the method, if CFR differences between samples taken within T same are closer to M diff than to a metric “M same” (a metric for CFR difference values expected within T same without an interferer), then such an observation may detect the presence of an interferer. This scenario will be discussed later in connection with
Note that T same may be obtained during the training phase using a first predetermined threshold th_same, optionally in conjunction with a second predetermined threshold th_diff. T diff may be obtained during the training phase using th_diff. For example, if an active emulated interferer is used to transmit interfering signals, a maximum cross-correlation of CFR pairs (within the T same window) is “X” (X<1.0), and then th_diff may be set equal to X.
In other embodiments, the similarity condition is determined during the training phase by developing a pre-trained neural network based on the CFR samples. During the operational phase, CFR samples are applied to the pre-trained neural network, which outputs a result indicating the similarity condition is satisfied (no interferer is present) or not satisfied (an interferer is present). This example will be discussed later in connection with
In still other embodiments, a training phase is omitted and the static time interval T same is predetermined, as is the similarity condition, where the predetermined value and condition may be based on the particular application.
A predefined static time interval T same may be obtained (S212). T same may have been input by a system designer and read from memory of receiving device 120, or, determined from the training signal phase of the method as described above for
Channel frequency response of the propagation channel between devices 130 and 120 may then be periodically measured at receiving device 120 to obtain pairs of CFR samples taken at intervals ≤T same (S214). The CFR samples may be samples of pilot signals, control signals and/or traffic signals communicated between devices 130 and 120. For example, as shown in
For each newly obtained pair of CFR samples, a difference or similarity in CFR may be determined between the first and second samples of the pair to ascertain a degree of similarity between the samples (S216). The method then determines if the similarity is high enough to satisfy the similarity condition (S218). If not, the method detects that an interferer initiated an attack and thereby modified the wireless channel within the time between the first and second samples (“interferer detected”) (S220). Otherwise, the flow may return to operation S214 and the monitoring for the presence of an interferer continues. As an example, in , i.e.,
CFR(p2)*CFR(p1)≥,
(where * denotes cross-correlation) then it may be determined that no interferer initiated an attack within window #1. In the evaluation of the next pair of CFR samples, if the CFR similarity is less than , then it may be determined that an interferer initiated an attack within the respective window. Thus, if:
CFR(p3)*CFR(p2)<,
then it may be determined that an interferer initiated an attack within window #2.
As described further below, in a nearest neighbor algorithm based embodiment (or other algorithm designed to find a closest result), the similarity condition may be a condition in which the metric M is closer to M same than to M diff. If M is closer to M diff, an interferer is detected (the result is Yin S218); otherwise, an interferer is not detected. In another example, the similarity condition may be defined in terms of a supervised pre-trained neural network set, e.g., a set y0=0, y1=1 may be defined to represent a CFR pair is the same (similarity condition satisfied, no interferer detected); and a set y0=1, y1=0 may be defined to represent the CFR pair is different (similarity condition not satisfied, interferer is detected). This example will be discussed below in connection with
Once an interferer has been detected, the communication system 100 may initiate any suitable countermeasure, which may include ceasing communications, changing operating frequencies, scrambling codes, alerting a security system to locate the interferer, etc.
It is noted here that the intervals “T” between the consecutive pairs of CFR sampling periods may differ slightly from pair to pair. For instance, due to variations in data traffic, packets for CFR measurements may only be transmitted intermittently. Accordingly, a target time for the interval T may be established, and each consecutive pair of CFR samples may be transmitted within a certain range of the target time. When the target time is designed properly to take an expected range of the variation into account, T may vary from sample to sample, but will always be less than T same.
In the sequence S216a, a pair of consecutive CFR samples (e.g., CFR(p1), CFR(p2)) may be applied to the cross-correlation algorithm (S416). A cross-correlation result of the algorithm may then be compared with a predetermined cross-correlation ratio (threshold of the similarity condition) (S426). The flow then returns to S218 of
; otherwise, the periodic measurements continue at S214.
The cross-correlation algorithm and comparisons for the interferer detection may be based on the following: the training phase may include operations of defining a channel observation (with time span [t0, t1, . . . , tN-1] and frequency span [f0, f1, . . . , fK-1]) as a 2D data sample:
H([t0,t1, . . . ,tN-1],[f0,f1, . . . ,fK-1])∈CN×K,
where the short hand notation H(t0, T) means observation within time span [t0, t0+T). If a uniform time sampling period is assumed as ΔT, then T=NΔT. A special case H(t0, ΔT)=h(t0) may be used to represent a one dimensional (1D) data sample. Channel measurement data may be a sequence of 1D data samples h(tn),
n=0,1,2, . . . .
During the training phase (
Positive set: H(tna,T),H(tnb,T)},{|tnb−tna|≤T same}.
Here, |tnb−tna| may be small enough to allow for a practical setting of T same as a window during which it is desirable to know when an interferer attack begins, such as in the tenths of a second range in an environment associated with pedestrian speeds.
The cross-correlation based detection technique may be implemented with a pair of just 1D data samples (each sample based on results for all K frequencies), one at the beginning of a window and one at the end, are compared. Cross-correlation between two “channel data” h(tna) and h(tnb) may be defined as
For example, h(tna) and h(tnb) may be consecutive samples of CFR measurements, such as CFR(p2) and CFR(p1), respectively, of
In the sequence S216b, a pair of consecutive CFR samples (e.g., CFR(p1), CFR(p2)) may be applied to the nearest neighbor algorithm (S516). The nearest neighbor algorithm may calculate a metric M based on the CFR samples, and may determine whether M is closer to the metric M same or to the metric M diff (S526). M same and M diff may have been determined during the training phase or read from memory as predetermined values for the particular application. The similarity condition may be satisfied when M is closer to M same. A result of the algorithm may then be output (e.g., a bit indicating that M is closer to M same, or that M is closer to M diff), whereupon the operation S218 may detect that an interferer initiated an attack in the time between the CFR samples if M is closer to M diff.
An example of the nearest neighbor algorithm of S216b and the development of the metrics M same and M diff are as follows:
To obtain M same and M diff, during the training phase of
Positive set: {H(tna,T),H(tnb,T)},{|tnb−tna|≤Tsame}
Negative set: {H(tna,T),H(tnb,T)},{Tdiff≤|tnb−tna|},
where |tnb−tna| is small enough for the positive set and large enough for the negative set.
M same and M diff may then be determined as:
M
same
E
{|t
−t
|≤T
}(Mt
M
diff
=E
{T
≤|t
−t
|}(M(t
where E(⋅) denotes expectation.
For the operational phase of the interferer detection method (
The first metric may be defined for 1D data or 2D data. For example, the first metric defined for 1D data may be as follows:
The second metric may be defined for 2D data as follows:
For 1D data, the second metric reduces to:
During the operational phase, the classification for a two-channel-pair with metric M=M(tna, tnb) (either one of the first or second metrics above) can be made as follows:
decision is “the same” when |M(t
decision is “different” when |M(t
where decision “different” results in an interferer detected at S220 of
In the sequence S216c, a pair of consecutive CFR samples (e.g., CFR(p1), CFR(p2)) may be applied to the neural network algorithm (S616), i.e., a pre-trained neural network. The neural network may output a result indicating whether the similarity condition is satisfied or not (S526). The flow then returns to S218 of
An example of the neural network algorithm approach of operation S216c is as follows: A neural network structure may have multiple layers, e.g., three layers in the following example. The input and output of a layer may be described as
a
j
(l+1)
=f
(l+1)(Σj
where M1 denotes the number of neurons in the lth layer (e.g., the 0th layer is the input layer in which M0=KN where K is the number of frequencies and N is the number of samples taken at different times; the 1st layer is the hidden layer in which M1=4; and the 2nd layer is the output layer in which M2=2). jl (jl∈[0, Ml−1]) is the index of the neuron in the l-th layer, and aj
The input of the neural network may be aj
and xn,k is defined as:
x
n,k
=∥H(tna,NΔT)|−|H(tnb,NΔT)∥,n∈[0,N−1],k∈[0,K−1].
A desired output (label) may be ŷi=aj
A loss function and optimization of the neural network may be as follows: Actual output of the neural network may be ŷi, where an optimization algorithm is used to minimize a softmax cross entropy loss function defined with or without regularization below.
Without regularization, the loss function may be defined as:
where
With regularization, the loss function may be defined as:
L
with_regularisation
=L
without_regularisation
+βr
where r is the regularization term defined as (L2 regularization):
where β denotes a scaling factor (e.g., β may be on the order of 0.01). The regularization may be used to overcome overfitting during training.
A predetermined number of samples (each with size KN) may define a batch size. A batch of samples may be fed into the neural network for each training iteration. The procedure of feeding all available training data into the neural network is referred to as a training epoch which may include multiple training iterations.
Combinations of at least two of the approaches of
Embodiments of the inventive concept such as those described above may exhibit several advantages over conventional methods. For instance, embodiments do not require modification of existing wireless communication protocols. On the other hand, new training sequences are required in [3] and [5], and additional signaling procedure is required in [4]. Additionally, embodiments may be designed for both pilot contamination and pilot jamming categories, and thus the technique does not need to know which category the interferer operates. Moreover, the inventive concept is applicable to both single and multiple antenna systems, whereas some conventional methods (e.g., [4]) require multiple antennas.
Example embodiments of the inventive concept have been described herein with reference to signal arrows, block diagrams (e.g., the flowcharts of the methods of
The term “processor” as used herein is intended to include any processing device, such as, for example, one that includes a central processing unit (CPU) and/or other processing circuitry (e.g., digital signal processor (DSP), microprocessor, etc.). Moreover, a “processor” includes computational hardware and may refer to a multi-core processor that contains multiple processing cores in a computing device. Various elements associated with a processing device may be shared by other processing devices.
While the inventive concept described herein has been particularly shown and described with reference to example embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the claimed subject matter as defined by the following claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
10-2020-0172608 | Dec 2020 | KR | national |