skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks
Intrusion detection is a challenging problem in wireless networks due to the broadcast nature of the wireless medium. Physical layer information is increasingly used to protect these vulnerable networks. Meanwhile, reconfigurable antennas are gradually finding their way into wireless devices due to their ability to improve data throughput. In this paper, the capabilities of reconfigurable antennas are used to devise an intrusion detection scheme that operates at the physical layer. The detection problem is posed as a GLRT problem that operates on the channels corresponding to the different modes of a reconfigurable antenna. The performance of the scheme is quantified through field measurements taken in an indoor environment at the 802.11 frequency band. Based on the measured data, we study the achievable performance and the effect of the different control parameters on the performance of the intrusion detection scheme. The effect of pattern correlation between the different modes on the scheme's performance is also analyzed, based on which general guidelines on how to design the different antenna modes are provided. The results show that the proposed scheme can add an additional layer of security that can significantly alleviate many vulnerabilities and threats in current fixed wireless networks.  more » « less
Award ID(s):
1028608
PAR ID:
10228966
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
International Journal of Distributed Sensor Networks
Volume:
9
Issue:
10
ISSN:
1550-1477
Page Range / eLocation ID:
564503
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Applying channel information for user authentication is gaining attention in the area of wireless network security. Similarly, reconfigurable antennas capable of generating multiple decorrelated channel realizations have become increasingly popular in wireless systems. In this paper we propose and evaluate a channel-based authentication scheme that applies the capabilities of a pattern reconfigurable antenna for improved performance in user authentication. Field measurements of the channel frequency response employing such an antenna were performed to quantify the performance of the proposed scheme. Based on these measurements, we show the effect of correlation that exists between the different modes on the authentication performance. Furthermore, the performance gain that can be achieved by the scheme is studied as a function of the number of antenna modes. Offline mode analysis is performed to give a loose upper bound on performance while online mode analysis results are presented to quantify achievable authentication performance in realtime. A general guideline on how to choose the different elements of the decision metric in order to realize better performance for physical layer-based authentication schemes based on any diversity scheme is also developed. 
    more » « less
  2. null (Ed.)
    Reconfigurable antenna systems have gained much attention for potential use in the next generation wireless systems. However, conventional direction-of-arrival (DoA) estimation algorithms for antenna arrays cannot be used directly in reconfigurable antennas due to different design of the antennas. In this paper, we present an adjacent pattern power ratio (APPR) algorithm for two-port composite right/left-handed (CRLH) reconfigurable leaky-wave antennas (LWAs). Additionally, we compare the performances of the APPR algorithm and LWA-based MUSIC algorithms. We study how the computational complexity and the performance of the algorithms depend on number of selected radiation patterns. In addition, we evaluate the performance of the APPR and MUSIC algorithms with numerical simulations as well as with real world indoor measurements having both line-of-sight and non-line-of-sight components. Our performance evaluations show that the DoA estimates are in a considerably good agreement with the real DoAs, especially with the APPR algorithm. In summary, the APPR and MUSIC algorithms for DoA estimation along with the planar and compact LWA layout can be a valuable solution to enhance the performance of the wireless communication in the next generation systems. 
    more » « less
  3. Orthogonal blinding based schemes for wireless physical layer security aim to achieve secure communication by injecting noise into channels orthogonal to the main channel and corrupting the eavesdropper’s signal reception. These methods, albeit practical, have been proven vulnerable against multiantenna eavesdroppers who can filter the message from the noise. The venerability is rooted in the fact that the main channel state remains stasis in spite of the noise injection, which allows an eavesdropper to estimate it promptly via known symbols and filter out the noise. Our proposed scheme leverages a reconfigurable antenna for Alice to rapidly change the channel state during transmission and a compressive sensing based algorithm for her to predict and cancel the changing effects for Bob. As a result, the communication between Alice and Bob remains clear, whereas randomized channel state prevents Eve from launching the knownplaintext attack. We formally analyze the security of the scheme against both single and multi-antenna eavesdroppers and identify its unique anti-eavesdropping properties due to the artificially created fast changing channel. We conduct extensive simulations and real-world experiments to evaluate its performance. Empirical results show that our scheme can suppress Eve’s attack success rate to the level of random guessing, even if she knows all the symbols transmitted through other antenna modes. 
    more » « less
  4. There has been recent work on the design of antenna arrays for beamforming in dynamic evolving environments such as in vehicle-to-vehicle communication systems. A key problem is that of determining how to optimally use a large antenna array to communicate with multiple spatially located vehicles in dynamically changing channel conditions with minimal co-channel interference while minimizing overall power consumption of the wireless system. We envision disjoint subsets of antennas in the array being used to direct beams concurrently to different vehicles. The number of antennas, gain and phase of each RF-chain driving an antenna are optimized dynamically using a constrained quadratic cost formulation encompassing channel quality, interference and power consumption. This quadratic optimization problem is solved using behavior constrained bandit algorithm, a reinforcement learning based technique. A gaussian kernel is used to perform data clustering of vehicle environment and resulting solutions, allowing quick bootstrapping of the bandit solver to find optimal array configurations in real-time vehicle environments. Simulation studies prove the viability of the proposed scheme. 
    more » « less
  5. Reconfigurable intelligent surface (RIS) technology is emerging as a promising technique for performance enhancement for next-generation wireless networks. This paper investigates the physical layer security of an RIS-assisted multiple-antenna communication system in the presence of random spatially distributed eavesdroppers. The RIS-to-ground channels are assumed to experience Rician fading. Using stochastic geometry, exact distributions of the received signal-to-noise-ratios (SNRs) at the legitimate user and the eavesdroppers located according to a Poisson point process (PPP) are derived, and closed-form expressions for the secrecy outage probability (SOP) and the ergodic secrecy capacity (ESC) are obtained to provide insightful guidelines for system design. First, the secrecy diversity order is obtained as 2α2 , where α2 denotes the path loss exponent of the RIS-to-ground links. Then, it is revealed that the secrecy performance is mainly affected by the number of RIS reflecting elements, N, and the impact of the number of transmit antennas and transmit power at the base station is marginal. In addition, when the locations of the randomly located eavesdroppers are unknown, deploying the RIS closer to the legitimate user rather than to the base station is shown to be more efficient. Moreover, it is also found that the density of randomly located eavesdroppers, λe , has an additive effect on the asymptotic ESC performance given by log2(1/λe) . Finally, numerical simulations are conducted to verify the accuracy of these theoretical observations. 
    more » « less