語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Robust PHY-Layer Signaling and Enhanced Security for Wi-Fi Systems /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Robust PHY-Layer Signaling and Enhanced Security for Wi-Fi Systems // Zhengguang Zhang.
作者:
Zhang, Zhengguang,
面頁冊數:
1 electronic resource (202 pages)
附註:
Source: Dissertations Abstracts International, Volume: 86-07, Section: B.
Contained By:
Dissertations Abstracts International86-07B.
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=31769417
ISBN:
9798302159786
Robust PHY-Layer Signaling and Enhanced Security for Wi-Fi Systems /
Zhang, Zhengguang,
Robust PHY-Layer Signaling and Enhanced Security for Wi-Fi Systems /
Zhengguang Zhang. - 1 electronic resource (202 pages)
Source: Dissertations Abstracts International, Volume: 86-07, Section: B.
Wi-Fi is a key component of the wireless ecosystem. It is the predominant technology for indoor wireless access and increasingly for outdoor use, with ubiquitous deployment for networks at enterprise, healthcare, public safety, residential buildings, smart factories, offices, restaurants, and many more. Its prevalence relies on continuous advancements in its efficiency, capacity, coverage, and security. To improve these aspects, Wi-Fi protocols have rapidly evolved over the past two decades, incorporating more advanced features, specified by a series of IEEE 802.11 standards. Seamless support of these features while maintaining compatibility and interoperability with earlier Wi-Fi generations necessitates robust Physical (PHY)-layer signaling. Such signaling plays a crucial role in frame processing and channel access by conveying essential parameters, e.g., frame length, transmission rate, connection bandwidth, beamforming capabilities, etc. Moreover, PHY-layer signaling has the potential to facilitate PHY-layer authentication and encryption. Despite its clear benefits, existing Wi-Fi PHY-layer signaling introduces high overhead due to the extended Signaling (SIG) fields of the frame header. Moreover, legacy devices cannot decode newly added SIG fields that are tailored for advanced features, thus limiting their functionality. Furthermore, existing Wi-Fi PHY-layer signaling lacks adequate protection for confidentiality, authenticity, and integrity. These vulnerabilities along with other inherent problems in the PHY-layer implementations of Wi-Fi standards have exposed Wi-Fi systems to various attacks. This dissertation focuses on developing novel robust PHY-layer signaling for Wi-Fi, and exploring security threats that target PHY-layer signaling and their countermeasures.We first propose a novel and robust PHY-layer signaling mechanism for recent generations of Wi-Fi that are built on Orthogonal Frequency Division Multiplexing (OFDM) and Multiple-Input-Multiple-Output (MIMO). More specifically, we develop a scheme called Extensible Preamble Modulation (eP-Mod), which enables Wi-Fi devices to embed user-defined signaling bits within the Short Training Fields (STFs) of the preamble. To strike a balance between capacity and reliability, we explore multiple eP-Mod variants that adapt to channel conditions and leverage MIMO diversity and multiplexing gains. We then extend eP-Mod to different MIMO schemes, channel widths, and OFDM-based IEEE 802.11 standards while maintaining low design complexity. Most importantly, our redesigned STFs satisfy the stringent IEEE standards' requirements on the preamble functions, including frame detection and synchronization. Therefore, STF with eP-Mod offers a robust PHY-layer signaling approach without compromising the primary functions of the standardized preamble. Furthermore, our scheme is backward-compatible with legacy (eP-Mod-unaware) devices. Through numerical analysis, extensive simulations, and hardware experiments, we demonstrate the practicality and reliability of eP-Mod.Next, we study adversarial attacks on existing PHY-layer signaling mechanism. We uncover vulnerabilities in standardized Wi-Fi preambles, including predictability, weak integrity, and lack of authenticity and confidentiality guarantees. We craft three Preamble Injection and Spoofing (PrInS) attacks that exploit these vulnerabilities along with the PHY-layer receive state machine and the capture effect. In PrInS attacks, an adversary can inject forged preambles without payloads, aiming to disrupt legitimate receptions or force deferral of legitimate transmissions. As a countermeasure, we propose to customize and randomize STFs of the preamble using eP-Mod so that a Wi-Fi device can authenticate a received preamble. Accordingly, we enhance the receive state machine to incorporate the preamble authentication and following mitigation steps.We then introduce a novel SIG tampering (SIGTAM) attack against the crucial SIGs of the preamble. In SIGTAM, an adversary transmits a carefully crafted adversarial signal on select subcarriers of the targeted SIGs while remaining resilient to integrity validation, channel impairments, and synchronization errors. We also introduce a selective jamming attack on the SIGs, called SIGJAM, to demonstrate the superiority of SIGTAM in terms of power efficiency and efficacy. To defend against the SIGTAM attack, we propose a scheme that detects the attack, identifies affected subcarriers, and recovers legitimate SIGs. In our experiments and simulations, PrInS and SIGTAM attacks are shown to lead to high frame discard and error rates, low channel utilization, poor throughput, and high latency. Besides, these attacks are stealthy and energy-efficient, as the adversarial signal only lasts for a few microseconds and may span narrow and dynamic bands. This poses challenges to their detection. Nevertheless, these attacks can be detected by our proposed approaches with nearly 100% probability in most scenarios. Moreover, SIGs can be successfully recovered from the SIGTAM attack except for attacks with marginal normalized energy. Our defense mechanisms are shown to have no impact on the performance of the Wi-Fi system.Finally, we utilize machine learning (ML) techniques to detect and classify smart jamming on Wi-Fi systems. While our initial focus is on preamble jamming, pilot jamming, and interleaving jamming, our approach can be generalized to selective attacks like SIGTAM and SIGJAM. To deal with the time-frequency selectivity of smart jamming, we apply the continuous wavelet transform (CWT) to partially overlapped segments of the received in-phase and quadrature (I/Q) samples for feature extraction. The scalogram of the CWT is used as input to a deep convolutional neural network (DCNN) classifier that determines the type of smart jamming attack. Our solution achieves high accuracy in detecting and classifying these jamming attacks even at a high signal-to-jamming power ratio (SJR), with robustness against variants of preamble jamming and pilot jamming. Notably, the proposed scalogram-based classifier outperforms the spectrogram-based classifier, especially in the high SJR regime.
English
ISBN: 9798302159786Subjects--Topical Terms:
559429
Information technology.
Subjects--Index Terms:
Network security
Robust PHY-Layer Signaling and Enhanced Security for Wi-Fi Systems /
LDR
:07668nam a22004333i 4500
001
1157890
005
20250603111436.5
006
m o d
007
cr|nu||||||||
008
250804s2025 miu||||||m |||||||eng d
020
$a
9798302159786
035
$a
(MiAaPQD)AAI31769417
035
$a
AAI31769417
040
$a
MiAaPQD
$b
eng
$c
MiAaPQD
$e
rda
100
1
$a
Zhang, Zhengguang,
$e
author.
$0
(orcid)0000-0002-6069-0555
$3
1484180
245
1 0
$a
Robust PHY-Layer Signaling and Enhanced Security for Wi-Fi Systems /
$c
Zhengguang Zhang.
264
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2025
300
$a
1 electronic resource (202 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertations Abstracts International, Volume: 86-07, Section: B.
500
$a
Advisors: Krunz, Marwan Committee members: Li, Ming; Lee, Eung-Joo; Liu, Jian.
502
$b
Ph.D.
$c
The University of Arizona
$d
2025.
520
$a
Wi-Fi is a key component of the wireless ecosystem. It is the predominant technology for indoor wireless access and increasingly for outdoor use, with ubiquitous deployment for networks at enterprise, healthcare, public safety, residential buildings, smart factories, offices, restaurants, and many more. Its prevalence relies on continuous advancements in its efficiency, capacity, coverage, and security. To improve these aspects, Wi-Fi protocols have rapidly evolved over the past two decades, incorporating more advanced features, specified by a series of IEEE 802.11 standards. Seamless support of these features while maintaining compatibility and interoperability with earlier Wi-Fi generations necessitates robust Physical (PHY)-layer signaling. Such signaling plays a crucial role in frame processing and channel access by conveying essential parameters, e.g., frame length, transmission rate, connection bandwidth, beamforming capabilities, etc. Moreover, PHY-layer signaling has the potential to facilitate PHY-layer authentication and encryption. Despite its clear benefits, existing Wi-Fi PHY-layer signaling introduces high overhead due to the extended Signaling (SIG) fields of the frame header. Moreover, legacy devices cannot decode newly added SIG fields that are tailored for advanced features, thus limiting their functionality. Furthermore, existing Wi-Fi PHY-layer signaling lacks adequate protection for confidentiality, authenticity, and integrity. These vulnerabilities along with other inherent problems in the PHY-layer implementations of Wi-Fi standards have exposed Wi-Fi systems to various attacks. This dissertation focuses on developing novel robust PHY-layer signaling for Wi-Fi, and exploring security threats that target PHY-layer signaling and their countermeasures.We first propose a novel and robust PHY-layer signaling mechanism for recent generations of Wi-Fi that are built on Orthogonal Frequency Division Multiplexing (OFDM) and Multiple-Input-Multiple-Output (MIMO). More specifically, we develop a scheme called Extensible Preamble Modulation (eP-Mod), which enables Wi-Fi devices to embed user-defined signaling bits within the Short Training Fields (STFs) of the preamble. To strike a balance between capacity and reliability, we explore multiple eP-Mod variants that adapt to channel conditions and leverage MIMO diversity and multiplexing gains. We then extend eP-Mod to different MIMO schemes, channel widths, and OFDM-based IEEE 802.11 standards while maintaining low design complexity. Most importantly, our redesigned STFs satisfy the stringent IEEE standards' requirements on the preamble functions, including frame detection and synchronization. Therefore, STF with eP-Mod offers a robust PHY-layer signaling approach without compromising the primary functions of the standardized preamble. Furthermore, our scheme is backward-compatible with legacy (eP-Mod-unaware) devices. Through numerical analysis, extensive simulations, and hardware experiments, we demonstrate the practicality and reliability of eP-Mod.Next, we study adversarial attacks on existing PHY-layer signaling mechanism. We uncover vulnerabilities in standardized Wi-Fi preambles, including predictability, weak integrity, and lack of authenticity and confidentiality guarantees. We craft three Preamble Injection and Spoofing (PrInS) attacks that exploit these vulnerabilities along with the PHY-layer receive state machine and the capture effect. In PrInS attacks, an adversary can inject forged preambles without payloads, aiming to disrupt legitimate receptions or force deferral of legitimate transmissions. As a countermeasure, we propose to customize and randomize STFs of the preamble using eP-Mod so that a Wi-Fi device can authenticate a received preamble. Accordingly, we enhance the receive state machine to incorporate the preamble authentication and following mitigation steps.We then introduce a novel SIG tampering (SIGTAM) attack against the crucial SIGs of the preamble. In SIGTAM, an adversary transmits a carefully crafted adversarial signal on select subcarriers of the targeted SIGs while remaining resilient to integrity validation, channel impairments, and synchronization errors. We also introduce a selective jamming attack on the SIGs, called SIGJAM, to demonstrate the superiority of SIGTAM in terms of power efficiency and efficacy. To defend against the SIGTAM attack, we propose a scheme that detects the attack, identifies affected subcarriers, and recovers legitimate SIGs. In our experiments and simulations, PrInS and SIGTAM attacks are shown to lead to high frame discard and error rates, low channel utilization, poor throughput, and high latency. Besides, these attacks are stealthy and energy-efficient, as the adversarial signal only lasts for a few microseconds and may span narrow and dynamic bands. This poses challenges to their detection. Nevertheless, these attacks can be detected by our proposed approaches with nearly 100% probability in most scenarios. Moreover, SIGs can be successfully recovered from the SIGTAM attack except for attacks with marginal normalized energy. Our defense mechanisms are shown to have no impact on the performance of the Wi-Fi system.Finally, we utilize machine learning (ML) techniques to detect and classify smart jamming on Wi-Fi systems. While our initial focus is on preamble jamming, pilot jamming, and interleaving jamming, our approach can be generalized to selective attacks like SIGTAM and SIGJAM. To deal with the time-frequency selectivity of smart jamming, we apply the continuous wavelet transform (CWT) to partially overlapped segments of the received in-phase and quadrature (I/Q) samples for feature extraction. The scalogram of the CWT is used as input to a deep convolutional neural network (DCNN) classifier that determines the type of smart jamming attack. Our solution achieves high accuracy in detecting and classifying these jamming attacks even at a high signal-to-jamming power ratio (SJR), with robustness against variants of preamble jamming and pilot jamming. Notably, the proposed scalogram-based classifier outperforms the spectrogram-based classifier, especially in the high SJR regime.
546
$a
English
590
$a
School code: 0009
650
4
$a
Information technology.
$3
559429
650
4
$a
Computer engineering.
$3
569006
650
4
$a
Electrical engineering.
$3
596380
653
$a
Network security
653
$a
Physical-layer security
653
$a
Wi-Fi protocols
653
$a
Pilot jamming
690
$a
0544
690
$a
0489
690
$a
0464
690
$a
0800
710
2
$a
The University of Arizona.
$b
Electrical & Computer Engineering.
$3
1189571
720
1
$a
Krunz, Marwan
$e
degree supervisor.
773
0
$t
Dissertations Abstracts International
$g
86-07B.
790
$a
0009
791
$a
Ph.D.
792
$a
2025
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=31769417
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入