You are on page 1of 21

Cross Layer Concept Based Security Algorithm for

Wireless Networks

A THESIS
SUBMITTED IN FULFILLMENT OF THE REQUIREMENTS FOR THE
AWARD OF THE DEGREE

OF
DOCTOR OF PHILOSOPHY

By
SANDEEP SHARMA
ROLL NO. ICT/PHD/1004

Under the Supervision of


Dr. Rajesh Mishra

Department of Electronics & Communication Engineering


SCHOOL OF INFORMATION AND COMMUNICATION TECHNOLOGY
GAUTAM BUDDHA UNIVERSITY
GREATER NOIDA-201 312 (U.P.)
© 2015, Sandeep Sharma All rights reserved

1
Certificate

T his is to certify that the thesis entitled “Cross Layer Concept Based Security
Algorithm for Wireless Networks”, which is being submitted by Mr. Sandeep
Sharma for the fulfillment of the requirements for the degree of Doctor of
Philosophy has been carried out under my supervision. This work has been carried
out from March, 2011 to October, 2015 under my supervision and guidance. To the
best of my knowledge, the matter embodied in this thesis has not been submitted
for the award of any other degree or diploma.

(Dr. Rajesh Mishra)


School of Information & Communication Technology
Gautam Buddha University

Countersigned by
Head of the Department/Dean of School

October, 2015

2
Self-declaration
I certify that
a. The work contained in this thesis is original and has been done by me under
the guidance of my supervisor.
b. The work has not been submitted to any other institute for any degree and
diploma
c. I have followed the guidelines provided by the School of ICT in preparing the
thesis.
d. Where ever I have used material (data, theoretical analysis, figure and text)
from others sources, I have given due credit to them by citing them in the text
of the thesis and giving their details in the references. Further, I have taken
the permission from the copy right owner of the source whenever necessary.
e. I have followed the standards of research ethics to the best of my abilities. I
have acknowledged all sources of information which I used in the thesis. I
have completed all Pre-submission requirements as mentioned in UGC
guidelines and GBU Ph.D. ordinance.

(Sandeep Sharma)
Ph.D./ICT/1004
School of I.C.T.
Date:_________________

Gautam Buddha University

3
Dedicated to

My Parents
Late. Ramdhan Ji Sharma
Mrs. Dularidevi Sharma

My Wire
Anjali
&
My Daughters
Asmita,and Sanvi

4
Acknowledgements

(Sandeep Sharma)
Roll No: PHD/ICT/1004

5
Abstract

6
List of Publications

This section provides a list of publications that has been derived from the work presented in this
thesis.

Research Papers Published/Accepted/Communicated in Journals and Full Papers in


Conference Proceedings.

7
Contents
Certificate
Self Declaration
Acknowledgement i
Abstract iii
List of Publication v
List of Figure x
List of Tables xiv
List of Abbreviations xv
List of Notation xviii
Chapter 1: Introduction 01
1.1. Wired Vs Wireless……………………………………………………………... 02
1.2. The Wireless Channel………………………………………………………….. 04
1.3 Small-Scale Multipath Propagation……………………………………………. 04
1.3.1. Physical Basis of Fading………………………………………………... 05
1.3.2. Factor Influencing Small-Scale Fading…………………………………. 06
1.4. Security Fundamental Concepts……………………………………………….. 09
1.4.1. Vulnerabilities of Wireless Networks…………………………………... 09
1.5. Network Security Issues……………………………………………………… 10
1.6. Types of Security Attacks……………………………………………………. 11
1.7. Security Threats in Different Protocol Layers………………………………… 14
1.8. Identification of Research Gaps and Motivation……………………………… 18
1.9. Research Objectives…………………………………………………………… 21
1.10. Thesis Organization…………………………………………………………… 22
1.11. Conclusions……………………………………………………………………. 24
Chapter 2: Literature Review 25
2.1. Literature Survey……………………………………………………………..... 25
2.1.1. Literature Survey on Physical Layer Authentication……………… … 25
2.1.2. Literature Survey on Nakagami-m Fading Channels………...………..... 28
2.1.3. Literature Survey on Cross Layer Design Techniques.............................. 36
2.1.4. Literature Survey on Miscellaneous Objectives........................................ 52
2.2. Literature Survey: A Summary…………………..………………...........…...... 53
2.3. Conclusions…………………………….………………………..............…….. 62
Chapter 3: Cross Layer Design for Wireless Networks 64
3.1. Introduction…………………………………….…………….............……….. 64

8
3.2. Cross layer Design in Wireless Network…………………………..........……... 67
3.2.1. Definitions of Cross Layer Design……………………………………... 67
3.2.2. Motivation Towards Cross Layer Design…..…………....................…… 69
3.2.3. Cross Layer Proposals…………............................................................... 74
3.3. Evaluating a Cross Layer Proposal……………………………………………. 79
3.4. Challenges Involved in Cross Layer Design…...……….…………................... 79
3.5. Conclusions……………………………………………………......................... 82
Chapter 4: Physical Layer Authentication 83
4.1. Introduction......................................................................................................... 83
4.2. Proposed System Model………………………….............................................. 84
4.2.1. Proposed Scenario…………………………………………………… 84
4.2.2. Proposed Tag Generation Algorithm……………………………………. 85
4.3. Scrambling........................................................................................................... 87
4.3.1. Scrambler and Descrambler Circuit………………………………….… 88
4.3.2. Working of Scrambler and Descrambler……………………………….. 89
4.4. Security Analysis................................................................................................. 92
4.5. Simulation and Results........................................................................................ 92
4.6. Conclusion........................................................................................................... 95
Chapter 5: The Nakagami-m Fading Channel Modeling 96
5.1. The Wireless Channel…………….…………………………………...........…. 96
5.2. Envelope and Power Distribution in the Signal…..……………………............ 97
5.3. The Nakagami Distribution …..………………………………………….......... 99
5.4. Simulation Method …………………………………………………………..... 101
5.5. Result Analysis and Discussions…...………………….……………………..... 102
5.6. Conclusion and Future Work……………….……………………...................... 116
Chapter 6: Performance of OFDM over Nakagami-m Channel 117
6.1. Introduction of OFDM….................................................................................... 117
6.2. The Data Generation and Shaping....................................................................... 119
6.2.1. Data Generation........................................................................................ 119
6.2.2. Serial Conversion..................................................................................... 119
6.3. Convolutional Code............................................................................................ 120
6.3.1. State Representation and State Diagram.................................................. 121
6.3.2. Impulse Response of the Encoder………................................................. 122
6.3.3. State diagram representation of the encoder ………............................... 122
6.4. BPSK Modulation and Demodulation................................................................. 124
6.5. Serial to Parallel Conversion............................................................................... 125
6.6. Pilot Carrier Generation and Insertion................................................................ 126
6.7. The FFT and IFFT............................................................................................. 128
6.8. The Guard Interval or Cyclic Prefix.................................................................. 133
6.9. Parallel to Serial Conversion........................................................................... 135

9
6.10. Additive White Gaussian Noise......................................................................... 137
6.11. Channel Equalization........................................................................................... 137
6.12. Serial to Parallel Conversion............................................................................ 138
6.13. Removal of the Cyclic Prefix........................................................................... 138
6.14. Removal of the Pilot Carriers............................................................................ 139
6.14.1. Carrier Frequency Offset in OFDM....................................................... 141
6.14.2. Algorithm for Calculating CFO…........................................................... 141
6.15. Result and Discussions……............................................................................... 143
6.16. Conclusions........................................................................................................ 145
Chapter 7: Cross Layer Approach for Physical Layer Authentication 146
7.1. Cross Layer Architecture..................................................................................... 147
7.2. System Model used for Authentication............................................................... 150
7.3. OFDM Frame Structure....................................................................................... 153
7.4. Threshold Value Calculation….…….................................................................. 153
7.5. Cryptography………………….……................................................................. 154
7.5.1. Algorithm for Encryption…………………………………………..... 155
7.5.2. Algorithm for Decryption………………………………………......... 156
7.5.3. Cross Layer Algorithm for Physical Layer Authentication………... 156
7.6. Hypothesis Testing for Authentication…………………………………….... 160
7.6.1. Algorithm for Authentication Hypothesis………………………….. 161
7.7. Performance Evaluation of the Proposed System………………………… 161
7.8. Results and Conclusions…………………………………………………… 170
Chapter 8: Conclusions and Future Direction 171
8.1. Conclusions........................................................................................................ 171
8.2. Author’s Contributions………………............................................................ 173
8.3. Scope for Future Research................................................................................... 173
Bibliography................................................................................................................. 175

10
List of Figures
Fig. No. Description Page No.
1.1. Multipath Propagation Model………………………..…………….......... 04
1.2. Multipath Propagation Scenario….…………………………………….... 05
1.3. Illustration of Doppler Effect…….…………………………………….... 07
1.4. Outline of the thesis…………...….…………………………………….... 22
3.1. Cross Layer Design between layer 1-layer 3………….….…............…... 68
3.2. Cross-layer for Wireless Protocol Stack……………..…..….................... 68
3.3. Different Cross Layer Proposals (a-f)....................................................... 76
4.1. Proposed Authentication Scenario……….……………............................ 84
4.2. Physical Layer Authentication using Tag……………….........…………. 86
4.3. Scrambler and Descrambler Circuits….…………………..............……... 88
4.4. Accepted Messages at various SNR………...…………….............…….. 94
4.5. Acceptance at various message size......................................................... 94
5.1. Multipath due to single and multiple reflectors………………................. 96
5.2. Effect of multipath when only one impulse is transmitted........................ 97
5.3. Nakagami-m channel coefficients generation............................................ 102
5.4. Nakagami-m distribution plot for Ω=1 and m=0.5, 1, 3, and 5.5............... 104
5.5. Nakagami-m distribution plot for m=1 and Ω=1, 1.5, 2, and 2.5............... 104
5.6. Simulated Rayleigh Fading Channel with m=1......................................... 105
5.7. Simulated Rician Fading Channel with m=1............................................. 105
5.8. Simulated Nakagami-m Fading Channel with m=1…............................... 106
5.9. Simulated Rayleigh Fading Channel with m=1.0286…............................ 106
5.10. Simulated Rician Fading Channel with m=1.0286.................................... 107
5.11. Simulated Nakagami-m Fading Channel with m=1.0286.......................... 107
5.12. Simulated Rayleigh Fading Channel with m=1.125.................................. 108
5.13. Simulated Rician Fading Channel with m=1.125...................................... 108

11
5.14. Simulated Nakagami-m Fading Channel with m=1.125............................ 109
5.15. Simulated Rayleigh Fading Channel with m=1.2462…............................ 109
5.16. Simulated Rician Fading Channel with m=1.2462................................... 110
5.17. Simulated Nakagami-m Fading Channel with m=1.2462.......................... 110
5.18. Simulated Rayleigh Fading Channel with m=1.3333................................ 111
5.19. Simulated Rician Fading Channel with m=1.3333.................................... 111
5.20. Simulated Nakagami-m Fading Channel with m=1.3333.......................... 112
5.21. Channel Response of the Simulated Nakagami-m Fading Channel.......... 112
5.22. Impulse Response when channel input is 00000100000…....................... 113
5.23. Impulse Response when channel input is 000000000010000000000........ 113
Magnitude and Phase Response of the Simulated Nakagami-m Fading
5.24.
Channel ………………………………………………………………….. 114
5.25. Level crossing rate at threshold 0.08 (a-b)................................................ 114
5.26. Level crossing rate at threshold 0.05 (a-b)…............................................ 115
6.1. OFDM Carriers………………………………………………………….. 118
6.2. Spectrum saving using OFDM…….......................................................... 119
6.3. Block Diagram Representation of OFDM Transmitter and Receiver........ 120
Convolutional Encoder Design with Constraint Length 3 & Code Rate
6.4.
½…………………………………………………………………………. 121
6.5. State Diagram of the Encoder…………................................................... 123
6.6. Phase-State Diagram of BPSK…….......................................................... 124
6.7. Data Input, BPSK Modulated Waveform, Demodulated Waveform……. 125
6.8. Formation of OFDM Signal...................................................................... 126
6.9. Pilot carrier generation and their location in the OFDM symbol.............. 127
6.10. Pilot carriers inserted into the OFDM symbols......................................... 127
6.11. Individual pilot carriers inserted at the transmitter.................................. 128
6.12. Generation of OFDM Symbols using FFT & IFFT….............................. 130
6.13. A typical view of the IFFT of the OFDM Symbols................................... 132
A typical view of the FFT and Pilot Subcarriers in the OFDM
6.14.
Symbols................................................................................................. 133
6.15. Generation and Insertion of 1/4 Cyclic Prefix…....................................... 133

12
6.16. Plot of consecutive pilot subcarriers in time domain................................ 134
6.17. OFDM signal transmission on the channel………………....................... 135
6.18. Three OFDM Symbol with cyclic prefix….............................................. 136
6.19. Data transmitted on the Nakagami-m channel…...................................... 139
6.20. Removal of the cyclic prefix from the received symbols……................... 138
6.21. OFDM symbols after cyclic prefix removal…………….......................... 139
6.22. Removal of the pilot carriers…….............................................................. 139
6.23. Received pilots at the receiver…............................................................... 140
6.24. Individual pilots at the receiver…….......................................................... 140
6.25. Carrier frequency offset plot with 12 pilot carriers…................................ 142
6.26. The frequency range occupied by the subcarriers used.............................. 142
6.27. Performance of OFDM over Nakagami Channel (BER Vs SNR)............. 144
6.28. Performance of OFDM over Nakagami Channel (BER Vs Eb/N0)……… 144
6.29. Channel capacity of the simulated channel against SNR ......................... 145
7.1. Cross Layer Architecture used for physical layer..................................... 149
7.2. Flow Chart of the encryption and decryption process…............................ 152
7.3. Frame structure used for OFDM transmission........................................... 153
7.4. Error values for 100 iterations for setting the threshold value of error...... 154
7.5. A general crypto-system……..……......................................................... 155
7.6. Flowchart showing the encryption technique with PN sequence............... 157
7.7. Flowchart showing the decryption technique with PN sequence............... 158
7.8. Flowchart showing the authentication process…………........................... 159
7.9. Frames transfer during the authentication process…………………......... 160
7.10. Transmitted Pilot Carriers with m=1.0001................................................. 162
7.11. Received Pilot Carriers with m=1.0001..................................................... 162
7.12. Composite error plot with m=1.0001........................................................ 162
7.13. BER Vs SNR plot with m=1.0001............................................................. 162
7.14. Transmitted Pilot Carriers with m=1.0004................................................ 163
7.15. Received Pilot Carriers with m=1.0004..................................................... 163

13
7.16. Composite error plot with m=1.0004......................................................... 163
7.17. BER Vs SNR plot with m=1.0004…......................................................... 163
7.18. Transmitted Pilot Carriers with m=1.0023................................................ 164
7.19. Received Pilot Carriers with m=1.0023..................................................... 164
7.20. Composite error plot with m=1.0023…..................................................... 164
7.21. BER Vs SNR plot with m=1.0023…......................................................... 164
7.22. Transmitted Pilot Carriers with m=1.0286................................................ 165
7.23. Received Pilot Carriers with m=1.0286…................................................. 165
7.24. Composite error plot with m=1.0286......................................................... 165
7.25. BER Vs SNR plot with m=1.0286…......................................................... 165
7.26. Transmitted Pilot Carriers with m=1.0323................................................. 166
7.27. Received Pilot Carriers with m=1.0323..................................................... 166
7.28. Composite error plot with m=1.0323......................................................... 166
7.29. BER Vs SNR plot with m=1.0323……..................................................... 166
7.30. Transmitted Pilot Carriers with m=1.0362................................................. 167
7.31. Received Pilot Carriers with m=1.0362..................................................... 167
7.32. Composite error plot with m=1.0362......................................................... 167
7.33. BER Vs SNR plot with m=1.0362…......................................................... 167
7.34. Transmitted Pilot Carriers with m=1.0417................................................. 168
7.35. Received Pilot Carriers with m=1.0417..................................................... 168
7.36. Composite error plot with m=1.0417......................................................... 168
7.37. BER Vs SNR plot with m=1.0417…......................................................... 168

14
List of Tables

Table No. Description Page No

1.1. Attacks on Different Network Layer……………………………...……... 13

1.2. Security Solutions for Wireless Networks………………………………. 17

2.1. Summary of Literature Survey …………….…………...……………..… 54

4.1. Table of the Proposed Symbol……........................................................... 85

4.2. Input and Output of Scrambler Circuit....................................................... 90

4.3. Scrambler Output after each iteration loop……........................................ 91

4.4. Tag Generated for Different Messages...................................................... 93

6.1. Input Bits and Output Code Words of the Convolutional Encoder ……... 122

6.2. Impulse Response of the Convolutional Encoder...................................... 122

6.3. Simulation Parameters Initialized for OFDM System............................... 131

7.1. Test for Authentication for Various Listed Parameters…......................... 169

15
List of Abbreviation
Abbreviation Description
ACK Acknowledgement
AFD Average Fade Duration
AM Amplitude Modulation
AODV Ad-hoc on Demand Distance Vector
AP Access Point
AWGN Additive White Gaussian Noise
BER Bit Error Rate
BICM-ID Bit Interleaved Coded Modulation
BPSK Binary Phase Shift Keying
CAR Cross-Layer based Adaptive Routing Algorithm
CARRADS Cross layer Adaptive Real-time Routing Attack Detection System
CBDT Cross Layer Based Detection and Authentication Technique
CDF Cumulative Density Functions
CDMA Code Division Multiple Access
CFO Carrier Frequency Offset
CLD Cross Layer Design
CP Cyclic Prefix
CSI Channel State Information
CTS Clear to Send
DFT Discrete Fourier Transform
DoS Denial of Service
DS-CDMA Direct Sequence Code Division Multiple Access
DSR Dynamic Source Routing
Eb/N0 Energy per Bit to Noise Power Spectral Density Ratio
Es/N0 Energy per Symbol to Noise Power Spectral Density Ratio
FFT Fast Fourier Transform

16
FM Frequency Modulation
GBO Global Bio-Diversity Outlook
HIDS Host Based Intrusion Detection System
i.i.d. Independent and Identically Distributed
ICDI Cross-Layer Design Interaction
ICI Inter-Carrier Interference
IDS Intrusion Detection System
IFFT Inverse Fast Fourier Transform
IP-Sec Internet Protocol Security
ISI Inter-Symbol Interference
i-SVM Incremental Support Vector Machine
LAN Local Area Network
LL Link Layer
LOS Line of Sight
LTI Linear Time Invariant
MAC Media Access Control
MANET Mobile Ad Hoc Network
MATLAB Matrix Laboratory
MIMO Multiple Inputs and Multiple Outputs
M-PSK M-array Phase Shift Keying
M-QAM M-array Quadrature Amplitude Modulation
NIC Network Identification Card
NIDS Network Based Intrusion Detection System
OFDM Orthogonal Frequency Division Multiplexing
OSI Open System Interconnection
PDA Personal Digital Assistant
PDF Probability Density Function
PER Packet Error Rate
PHY-CRAM Physical layer Challenge-Response Authentication Mechanism
PM Phase Modulation
PTK Pair-Wise Transient Key

17
QoS Quality of Service
QPSK Quadrature Phase Shift Keying
RMS Root Mean Square
RSSI Reverse Signal Strength Indicator
RTS Request to Send
RTT Round Trip Time
RVs Random Variables
SNR Signal to Noise Ratio
SSID Service Set Identifier
STO Symbol Time Offset
SVM Support Vector Machine
TCP Transmission Control Protocol
TCP-IP Transmission Control Protocol-Internet Protocol
TDD Time Division Duplexing
TDMA Time Division Multiple Access
UDP User Datagram Protocol
WAP Wireless Access Point
WiFi Wireless Fidelity
WLAN Wireless Local Area Network
WMAN Wireless Metropolitan Area Network
WMSNs Wireless Multimedia Sensor Networks
WPAN Wireless Personal Area Network
WSN Wireless Sensor Network

18
List of Notations
Notation Description
* Linear Convolution
A Signal Amplitude
ai The attenuation factor of ith path
b Message to be sent
c Velocity of light
c(t) Carrier Signal
C0 Convolution Encoder Code Word
C1 Convolution Encoder Code Word
d Separation between Tx and Rx
D Delay of one unit time
d0……..dN-1 OFDM Symbols
Dn Delay of n unit time
Dn(t) Data mapped to the chosen constellation of BPSK, QPSK or QAM etc.
t Time required for the mobile to travel a distance from X to Y
E(.) Expected Value
F Feedback path gain
fd Apparent change in the frequency i.e. Doppler shift
fe(T) Encrypted Scrambler Output
fft_size Size of the FFT
Fn Feedback path gain after n rounds
H Channel Response
H0 Null Hypothesis
H1 The Second Hypothesis
I0 Modified Bessel’s Function of Zero Order
k Shared Key
K Rician Fading Parameter

19
li Length of the ith path
m Nakagami-m Shaping Parameter
msg_length Length of the message
N Number of Data Symbols
N0/2 Power Spectral Density of White Noise
Pr Average Received Power based on the Path Loss and Shadowing alone
R De-Scrambler Output
Rt Resultant of X and Y
Rx Receiver at a point Y
S Scrambler Input
s2 Average Power in the Line of Sight Component
T Scrambler Output
tag_length Length of the authentication tag
Tb Single Bit Duration in Seconds
TS Symbol Duration
Tx Transmitter at a point X
W Noise Generated
X Gaussian Random Variable
X(k) Fast Fourier Transform of k
x(n) Inverse Fast Fourier Transform of n
Y Received Signal
Y Gaussian Random Variable
Z Complex Valued Nakagami-m fading Channel
z(t) Signal Envelope
Γ(.) Gamma Function
δ(t) Unit Impulse
Δl Change in the length
Δφ Phase deviation
θ Angle of elevation
λ Wavelength
σ2 Variance

20
τi Delay of the ith path due to different path length
Ω Expected Value of the Average Power
Ө Represents the In-phase Component
rI In-phase Components having Variance of σ2
rQ Quadrature-phase Components having Variance of σ2

pZ  z  Rayleigh Distribution

f R (r ) PDF for the Nakagami Fading Envelope


f R (r , ) Nakagami-m Phase Envelope Joint Distribution
Z1 Gaussian Distributed Column Vector
Z2 Gaussian Distributed Column Vector
τmax Maximum Multipath Propagation Delay
Ŵ Orthogonal Matrix
fn Orthogonal Frequency
 Circular Convolution

21

You might also like