Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3495243.3560547acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Protego: securing wireless communication via programmable metasurface

Published: 14 October 2022 Publication History

Abstract

Phased array beamforming has been extensively explored as a physical layer primitive to improve the secrecy capacity of wireless communication links. However, existing solutions are incompatible with low-profile IoT devices due to cost, power and form factor constraints. More importantly, they are vulnerable to eavesdroppers with a high-sensitivity receiver. This paper presents Protego, which offloads the security protection to a metasurface comprised of a large number of 1-bit programmable unit-cells (i.e., phase shifters). Protego builds on a novel observation that, due to phase quantization effect, not all the unit-cells contribute equally to beamforming. By judiciously flipping the phase shift of certain unit-cells, Protego can generate artificial phase noise to obfuscate the signals towards potential eavesdroppers, while preserving the signal integrity and beamforming gain towards the legitimate receiver. A hardware prototype along with extensive experiments has validated the feasibility and effectiveness of Protego.

References

[1]
[n.d.]. patch antenna. https://www.amazon.cn/s?k=patch+antennas.
[2]
[n.d.]. SMP1340-040LF. https://www.skyworksinc.com/Products/Diodes/SMP1340-Series.
[3]
Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020. BIAS: bluetooth impersonation attacks. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 549--562.
[4]
Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020. Key negotiation downgrade attacks on bluetooth and bluetooth low energy. ACM Transactions on Privacy and Security (TOPS) 23, 3 (2020), 1--28.
[5]
Venkat Arun and Hari Balakrishnan. 2020. RFocus: Beamforming using thousands of passive antennas. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 1047--1061.
[6]
C Baird and G Rassweiler. 1976. Adaptive sidelobe nulling using digitally controlled phase-shifters. IEEE Transactions on Antennas and Propagation 24, 5 (1976), 638--649.
[7]
Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, and Ingrid Verbauwhede. 2007. Public-key cryptography for RFID-tags. In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07). IEEE, 217--222.
[8]
George Robert Blakley. 1979. Safeguarding cryptographic keys. In Managing Requirements Knowledge, International Workshop on. IEEE Computer Society, 313--313.
[9]
Justin Chan, Kelly Michaelsen, Joanne K Estergreen, Daniel E Sabath, and Shyamnath Gollakota. 2022. Micro-mechanical blood clot testing using smartphones. Nature communications 13, 1 (2022), 1--12.
[10]
Lili Chen, Wenjun Hu, Kyle Jamieson, Xiaojiang Chen, Dingyi Fang, and Jeremy Gummeson. 2020. Pushing the Physical Limits of IoT Devices with Programmable Metasurfaces. arXiv preprint arXiv:2007.11503 (2020).
[11]
Kun Woo Cho, Mohammad H Mazaheri, Jeremy Gummeson, Omid Abari, and Kyle Jamieson. 2021. mmWall: A Reconfigurable Metamaterial Surface for mmWave Networks. In Proceedings of the 22nd International Workshop on Mobile Computing Systems and Applications. 119--125.
[12]
Manideep Dunna, Chi Zhang, Daniel Sievenpiper, and Dinesh Bharadia. 2020. ScatterMIMO: Enabling virtual MIMO with smart surfaces. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (MobiCom). 1--14.
[13]
Mohammed E Eltayeb, Junil Choi, Tareq Y Al-Naffouri, and Robert W Heath. 2016. On the security of millimeter wave vehicular communication systems using random antenna subsets. In 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall). IEEE, 1--5.
[14]
Chao Feng, Xinyi Li, Yangfan Zhang, Xiaojing Wang, Liqiong Chang, Fuwei Wang, Xinyu Zhang, and Xiaojiang Chen. 2021. RFlens: metasurface-enabled beamforming for IoT communication and sensing. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. 587--600.
[15]
Keming Feng, Xiao Li, Yu Han, Shi Jin, and Yijian Chen. 2020. Physical layer security enhancement exploiting intelligent reflecting surface. IEEE Communications Letters 25, 3 (2020), 734--738.
[16]
R Ghayoula, N Fadlallah, A Gharsallah, and M Rammal. 2009. Phase-only adaptive nulling with neural networks for antenna array synthesis. IET microwaves, antennas & propagation 3, 1 (2009), 154--163.
[17]
Dennis Goeckel, Sudarshan Vasudevan, Don Towsley, Stephan Adams, Zhiguo Ding, and Kin Leung. 2011. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE Journal on Selected Areas in Communications 29, 10 (2011), 2067--2076.
[18]
Satashu Goel and Rohit Negi. 2008. Guaranteeing secrecy using artificial noise. IEEE transactions on wireless communications 7, 6 (2008), 2180--2189.
[19]
Jeremy J Gummeson, Bodhi Priyantha, Deepak Ganesan, Derek Thrasher, and Pengyu Zhang. 2013. EnGarde: Protecting the mobile phone from malicious NFC interactions. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. 445--458.
[20]
Unsoo Ha, Salah Assana, and Fadel Adib. 2020. Contactless seismocardiography via deep learning radars. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--14.
[21]
Haitham Hassanieh, Jue Wang, Dina Katabi, and Tadayoshi Kohno. 2015. Securing RFIDs by Randomizing the Modulation and Channel. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). 235--249.
[22]
Randy L Haupt. 1997. Phase-only adaptive nulling with a genetic algorithm. IEEE Transactions on Antennas and Propagation 45, 6 (1997), 1009--1015.
[23]
Suraj Jog, Jiaming Wang, Junfeng Guan, Thomas Moon, Haitham Hassanieh, and Romit Roy Choudhury. 2019. Many-to-many beam alignment in millimeter wave networks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 783--800.
[24]
Karl Koscher, Ari Juels, Vjekoslav Brajkovic, and Tadayoshi Kohno. 2009. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. In Proceedings of the 16th ACM conference on Computer and communications security. 33--42.
[25]
Yuezhou Li, ME Bialkowski, KH Sayidmarie, and NV Shuley. 2010. 81-element single-layer reflectarray with double-ring phasing elements for wideband applications. In 2010 IEEE Antennas and Propagation Society International Symposium. IEEE, 1--4.
[26]
Zhuqi Li, Yaxiong Xie, Longfei Shangguan, Rotman Ivan Zelaya, Jeremy Gummeson, Wenjun Hu, and Kyle Jamieson. 2019. Towards programming the radio environment with large arrays of inexpensive antennas. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 285--300.
[27]
Franco Loi, Arunan Sivanathan, Hassan Habibi Gharakheili, Adam Radford, and Vijay Sivaraman. 2017. Systematically evaluating security and privacy for consumer IoT devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. 1--6.
[28]
Chuang Lu, Yan Wu, Reza Mahmoudi, Marion K Matters-Kammerer, and Peter GM Baltus. 2012. A mm-wave analog adaptive array with genetic algorithm for interference mitigation. In 2012 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2373--2376.
[29]
Sohrab Madani, Suraj Jog, Jesus O Lacruz, Joerg Widmer, and Haitham Hassanieh. 2021. Practical null steering in millimeter wave networks. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). 903--921.
[30]
Federico Marini and Beata Walczak. 2015. Particle swarm optimization (PSO). A tutorial. Chemometrics and Intelligent Laboratory Systems 149 (2015), 153--165.
[31]
Amitav Mukherjee and A Lee Swindlehurst. 2010. Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Transactions on Signal Processing 59, 1 (2010), 351--361.
[32]
Rohit Negi and Satashu Goel. 2005. Secret communication using artificial noise. In IEEE vehicular technology conference, Vol. 62. Citeseer, 1906.
[33]
John Nolan, Kun Qian, and Xinyu Zhang. 2021. RoS: passive smart surface for roadside-to-vehicle communication. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference. 165--178.
[34]
Yanjun Pan, Ziqi Xu, Ming Li, and Loukas Lazos. 2021. Man-in-the-middle attack resistant secret key generation via channel randomization. In Proceedings of the Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing. 231--240.
[35]
Jake Bailey Perazzone, L Yu Paul, Brian M Sadler, and Rick S Blum. 2021. Artificial noise-aided MIMO physical layer authentication with imperfect CSI. IEEE Transactions on Information Forensics and Security 16 (2021), 2173--2185.
[36]
Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan, and Anish Arora. 2016. PhyCloak: Obfuscating Sensing from Communication Signals. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 685--699.
[37]
Sekhar Rajendran, Zhi Sun, Feng Lin, and Kui Ren. 2020. Injecting reliable radio frequency fingerprints using metasurface for the Internet of Things. IEEE Transactions on Information Forensics and Security 16 (2020), 1896--1911.
[38]
Madhusudan Singh and Shiho Kim. 2018. Branch based blockchain technology in intelligent vehicle. Computer Networks 145 (2018), 219--231.
[39]
Nicolas Sklavos and I. D. Zaharakis. 2016. Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations. In 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 1--2.
[40]
Elahe Soltanaghaei, Akarsh Prabhakara, Artur Balanuta, Matthew Anderson, Jan M Rabaey, Swarun Kumar, and Anthony Rowe. 2021. Millimetro: mmWave retro-reflective tags for accurate, long range localization. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. 69--82.
[41]
Daniel Steinmetzer, Joe Chen, Jiska Classen, Edward Knightly, and Matthias Hollick. 2015. Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves. In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 335--343.
[42]
Xin Tan, Zhi Sun, Dimitrios Koutsonikolas, and Josep M. Jornet. 2018. Enabling Indoor Mobile Millimeter-wave Networks Based on Smart Reflect-arrays. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. 270--278.
[43]
Wade Trappe, Richard Howard, and Robert S Moore. 2015. Low-energy security: Limits and opportunities in the internet of things. IEEE Security & Privacy 13, 1 (2015), 14--21.
[44]
Ju Wang, Liqiong Chang, Shourya Aggarwal, Omid Abari, and Srinivasan Keshav. 2020. Soil moisture sensing with commodity RFID systems. In Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services. 273--285.
[45]
Song Wang, Jingqi Huang, Xinyu Zhang, Hyoil Kim, and Sujit Dey. 2020. X-array: Approximating omnidirectional millimeter-wave coverage using an array of phased arrays. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (MobiCom). 1--14.
[46]
Allen Welkie, Longfei Shangguan, Jeremy Gummeson, Wenjun Hu, and Kyle Jamieson. 2017. Programmable radio environments for smart spaces. In Proceedings of the 16th ACM Workshop on Hot Topics in Networks. 36--42.
[47]
Qingqing Wu and Rui Zhang. 2019. Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network. IEEE Communications Magazine 58, 1 (2019), 106--112.
[48]
Meng Zhang, Anand Raghunathan, and Niraj K Jha. 2013. MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Transactions on Biomedical circuits and Systems 7, 6 (2013), 871--881.
[49]
Qianqian Zhang, Ying-Chang Liang, and H Vincent Poor. 2020. Large intelligent surface/antennas (LISA) assisted symbiotic radio for IoT communications. arXiv preprint arXiv:2002.00340 (2020).
[50]
Renjie Zhao, Timothy Woodford, Teng Wei, Kun Qian, and Xinyu Zhang. 2020. M-cube: A millimeter-wave massive MIMO software radio. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (MobiCom). 1--14.
[51]
Yue Zheng, Yi Zhang, Kun Qian, Guidong Zhang, Yunhao Liu, Chenshu Wu, and Zheng Yang. 2019. Zero-effort cross-domain gesture recognition with Wi-Fi. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. 313--325.
[52]
X. Zhou and M. R. Mckay. 2010. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation. 59, 8 (2010), 3831--3842.
[53]
Yulong Zou, Jia Zhu, Xianbin Wang, and Lajos Hanzo. 2016. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 104, 9 (2016), 1727--1765.

Cited By

View all
  • (2024)CW-AcousLen: A Configurable Wideband Acoustic MetasurfaceProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661882(29-41)Online publication date: 3-Jun-2024
  • (2023)RMDM: Using Random Meta-Atoms to Send Directional Misinformation to Eavesdroppers2023 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS59707.2023.10288796(1-9)Online publication date: 2-Oct-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiCom '22: Proceedings of the 28th Annual International Conference on Mobile Computing And Networking
October 2022
932 pages
ISBN:9781450391818
DOI:10.1145/3495243
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 October 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IoT security
  2. eavesdropping
  3. metasurface
  4. physical layer security
  5. securing wireless communication
  6. security
  7. smart surface

Qualifiers

  • Research-article

Funding Sources

Conference

ACM MobiCom '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)277
  • Downloads (Last 6 weeks)25
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)CW-AcousLen: A Configurable Wideband Acoustic MetasurfaceProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661882(29-41)Online publication date: 3-Jun-2024
  • (2023)RMDM: Using Random Meta-Atoms to Send Directional Misinformation to Eavesdroppers2023 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS59707.2023.10288796(1-9)Online publication date: 2-Oct-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media