Abstract

ABSTRACT Wireless sensor network (WSN) physical layer (PHY) uses M-ary spread spectrum (MaSS). This paper explores MaSS and emphasizes that based on the implementation approach; the technology has the potential to provide security at the PHY of wireless devices. The MaSS parameters, namely, spreading sequences and symbol to sequence mapping logic, can be obfuscated for security implementation. In this paper, we have focused our analysis on obfuscating mapping logic, i.e. Mapping Obfuscation (MO). Mathematical analysis reveals that an eavesdropper with processing speed in the order of 1018 operations/sec can intercept and decode short length (maximum 8–10 bytes) packets in <100 s. Simulation exposes that the eavesdropper can achieve a success rate of 50% for short-length packets if its signal-to-noise ratio exceeds −1 dB. An attacker has only one check metric for mapping sequence detection that is correct frame check sequence (FCS) detection. However, FCS detection may be misleading; if packet-embedded FCS and eavesdropper-generated FCS are the same for the wrong mapping sequence. For MO-based MaSS, false FCS detection probability is 30 times more than valid FCS detection probability. To reduce false FCS probability attacker need to analyse multiple radio frequency (RF) packets for detecting a valid mapping key; this increases the computation time. For MO-based PHY security, correct mapping sequence identification by exhaustive search demands cluster-based parallel processing.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.