ABSTRACT
Phased array beamforming has been extensively explored as a physical layer primitive to improve the secrecy capacity of wireless communication links. However, existing solutions are incompatible with low-profile IoT devices due to cost, power and form factor constraints. More importantly, they are vulnerable to eavesdroppers with a high-sensitivity receiver. This paper presents Protego, which offloads the security protection to a metasurface comprised of a large number of 1-bit programmable unit-cells (i.e., phase shifters). Protego builds on a novel observation that, due to phase quantization effect, not all the unit-cells contribute equally to beamforming. By judiciously flipping the phase shift of certain unit-cells, Protego can generate artificial phase noise to obfuscate the signals towards potential eavesdroppers, while preserving the signal integrity and beamforming gain towards the legitimate receiver. A hardware prototype along with extensive experiments has validated the feasibility and effectiveness of Protego.
- [n.d.]. patch antenna. https://www.amazon.cn/s?k=patch+antennas.Google Scholar
- [n.d.]. SMP1340-040LF. https://www.skyworksinc.com/Products/Diodes/SMP1340-Series.Google Scholar
- Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020. BIAS: bluetooth impersonation attacks. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 549--562.Google ScholarCross Ref
- Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen. 2020. Key negotiation downgrade attacks on bluetooth and bluetooth low energy. ACM Transactions on Privacy and Security (TOPS) 23, 3 (2020), 1--28.Google ScholarDigital Library
- Venkat Arun and Hari Balakrishnan. 2020. RFocus: Beamforming using thousands of passive antennas. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 1047--1061.Google Scholar
- C Baird and G Rassweiler. 1976. Adaptive sidelobe nulling using digitally controlled phase-shifters. IEEE Transactions on Antennas and Propagation 24, 5 (1976), 638--649.Google ScholarCross Ref
- Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Mentens, Pim Tuyls, and Ingrid Verbauwhede. 2007. Public-key cryptography for RFID-tags. In Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07). IEEE, 217--222.Google ScholarDigital Library
- George Robert Blakley. 1979. Safeguarding cryptographic keys. In Managing Requirements Knowledge, International Workshop on. IEEE Computer Society, 313--313.Google Scholar
- Justin Chan, Kelly Michaelsen, Joanne K Estergreen, Daniel E Sabath, and Shyamnath Gollakota. 2022. Micro-mechanical blood clot testing using smartphones. Nature communications 13, 1 (2022), 1--12.Google Scholar
- Lili Chen, Wenjun Hu, Kyle Jamieson, Xiaojiang Chen, Dingyi Fang, and Jeremy Gummeson. 2020. Pushing the Physical Limits of IoT Devices with Programmable Metasurfaces. arXiv preprint arXiv:2007.11503 (2020).Google Scholar
- Kun Woo Cho, Mohammad H Mazaheri, Jeremy Gummeson, Omid Abari, and Kyle Jamieson. 2021. mmWall: A Reconfigurable Metamaterial Surface for mmWave Networks. In Proceedings of the 22nd International Workshop on Mobile Computing Systems and Applications. 119--125.Google ScholarDigital Library
- Manideep Dunna, Chi Zhang, Daniel Sievenpiper, and Dinesh Bharadia. 2020. ScatterMIMO: Enabling virtual MIMO with smart surfaces. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (MobiCom). 1--14.Google ScholarDigital Library
- Mohammed E Eltayeb, Junil Choi, Tareq Y Al-Naffouri, and Robert W Heath. 2016. On the security of millimeter wave vehicular communication systems using random antenna subsets. In 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall). IEEE, 1--5.Google ScholarCross Ref
- Chao Feng, Xinyi Li, Yangfan Zhang, Xiaojing Wang, Liqiong Chang, Fuwei Wang, Xinyu Zhang, and Xiaojiang Chen. 2021. RFlens: metasurface-enabled beamforming for IoT communication and sensing. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. 587--600.Google ScholarDigital Library
- Keming Feng, Xiao Li, Yu Han, Shi Jin, and Yijian Chen. 2020. Physical layer security enhancement exploiting intelligent reflecting surface. IEEE Communications Letters 25, 3 (2020), 734--738.Google ScholarCross Ref
- R Ghayoula, N Fadlallah, A Gharsallah, and M Rammal. 2009. Phase-only adaptive nulling with neural networks for antenna array synthesis. IET microwaves, antennas & propagation 3, 1 (2009), 154--163.Google Scholar
- Dennis Goeckel, Sudarshan Vasudevan, Don Towsley, Stephan Adams, Zhiguo Ding, and Kin Leung. 2011. Artificial noise generation from cooperative relays for everlasting secrecy in two-hop wireless networks. IEEE Journal on Selected Areas in Communications 29, 10 (2011), 2067--2076.Google ScholarCross Ref
- Satashu Goel and Rohit Negi. 2008. Guaranteeing secrecy using artificial noise. IEEE transactions on wireless communications 7, 6 (2008), 2180--2189.Google ScholarDigital Library
- Jeremy J Gummeson, Bodhi Priyantha, Deepak Ganesan, Derek Thrasher, and Pengyu Zhang. 2013. EnGarde: Protecting the mobile phone from malicious NFC interactions. In Proceeding of the 11th annual international conference on Mobile systems, applications, and services. 445--458.Google Scholar
- Unsoo Ha, Salah Assana, and Fadel Adib. 2020. Contactless seismocardiography via deep learning radars. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking. 1--14.Google ScholarDigital Library
- Haitham Hassanieh, Jue Wang, Dina Katabi, and Tadayoshi Kohno. 2015. Securing RFIDs by Randomizing the Modulation and Channel. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). 235--249.Google ScholarDigital Library
- Randy L Haupt. 1997. Phase-only adaptive nulling with a genetic algorithm. IEEE Transactions on Antennas and Propagation 45, 6 (1997), 1009--1015.Google ScholarCross Ref
- Suraj Jog, Jiaming Wang, Junfeng Guan, Thomas Moon, Haitham Hassanieh, and Romit Roy Choudhury. 2019. Many-to-many beam alignment in millimeter wave networks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 783--800.Google Scholar
- Karl Koscher, Ari Juels, Vjekoslav Brajkovic, and Tadayoshi Kohno. 2009. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. In Proceedings of the 16th ACM conference on Computer and communications security. 33--42.Google ScholarDigital Library
- Yuezhou Li, ME Bialkowski, KH Sayidmarie, and NV Shuley. 2010. 81-element single-layer reflectarray with double-ring phasing elements for wideband applications. In 2010 IEEE Antennas and Propagation Society International Symposium. IEEE, 1--4.Google Scholar
- Zhuqi Li, Yaxiong Xie, Longfei Shangguan, Rotman Ivan Zelaya, Jeremy Gummeson, Wenjun Hu, and Kyle Jamieson. 2019. Towards programming the radio environment with large arrays of inexpensive antennas. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 285--300.Google Scholar
- Franco Loi, Arunan Sivanathan, Hassan Habibi Gharakheili, Adam Radford, and Vijay Sivaraman. 2017. Systematically evaluating security and privacy for consumer IoT devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. 1--6.Google ScholarDigital Library
- Chuang Lu, Yan Wu, Reza Mahmoudi, Marion K Matters-Kammerer, and Peter GM Baltus. 2012. A mm-wave analog adaptive array with genetic algorithm for interference mitigation. In 2012 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2373--2376.Google ScholarCross Ref
- Sohrab Madani, Suraj Jog, Jesus O Lacruz, Joerg Widmer, and Haitham Hassanieh. 2021. Practical null steering in millimeter wave networks. In 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21). 903--921.Google Scholar
- Federico Marini and Beata Walczak. 2015. Particle swarm optimization (PSO). A tutorial. Chemometrics and Intelligent Laboratory Systems 149 (2015), 153--165.Google ScholarCross Ref
- Amitav Mukherjee and A Lee Swindlehurst. 2010. Robust beamforming for security in MIMO wiretap channels with imperfect CSI. IEEE Transactions on Signal Processing 59, 1 (2010), 351--361.Google ScholarDigital Library
- Rohit Negi and Satashu Goel. 2005. Secret communication using artificial noise. In IEEE vehicular technology conference, Vol. 62. Citeseer, 1906.Google Scholar
- John Nolan, Kun Qian, and Xinyu Zhang. 2021. RoS: passive smart surface for roadside-to-vehicle communication. In Proceedings of the 2021 ACM SIGCOMM 2021 Conference. 165--178.Google ScholarDigital Library
- Yanjun Pan, Ziqi Xu, Ming Li, and Loukas Lazos. 2021. Man-in-the-middle attack resistant secret key generation via channel randomization. In Proceedings of the Twenty-second International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing. 231--240.Google ScholarDigital Library
- Jake Bailey Perazzone, L Yu Paul, Brian M Sadler, and Rick S Blum. 2021. Artificial noise-aided MIMO physical layer authentication with imperfect CSI. IEEE Transactions on Information Forensics and Security 16 (2021), 2173--2185.Google ScholarDigital Library
- Yue Qiao, Ouyang Zhang, Wenjie Zhou, Kannan Srinivasan, and Anish Arora. 2016. PhyCloak: Obfuscating Sensing from Communication Signals. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). 685--699.Google ScholarDigital Library
- Sekhar Rajendran, Zhi Sun, Feng Lin, and Kui Ren. 2020. Injecting reliable radio frequency fingerprints using metasurface for the Internet of Things. IEEE Transactions on Information Forensics and Security 16 (2020), 1896--1911.Google ScholarDigital Library
- Madhusudan Singh and Shiho Kim. 2018. Branch based blockchain technology in intelligent vehicle. Computer Networks 145 (2018), 219--231.Google ScholarCross Ref
- Nicolas Sklavos and I. D. Zaharakis. 2016. Cryptography and Security in Internet of Things (IoTs): Models, Schemes, and Implementations. In 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 1--2.Google Scholar
- Elahe Soltanaghaei, Akarsh Prabhakara, Artur Balanuta, Matthew Anderson, Jan M Rabaey, Swarun Kumar, and Anthony Rowe. 2021. Millimetro: mmWave retro-reflective tags for accurate, long range localization. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking. 69--82.Google ScholarDigital Library
- Daniel Steinmetzer, Joe Chen, Jiska Classen, Edward Knightly, and Matthias Hollick. 2015. Eavesdropping with periscopes: Experimental security analysis of highly directional millimeter waves. In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 335--343.Google ScholarCross Ref
- Xin Tan, Zhi Sun, Dimitrios Koutsonikolas, and Josep M. Jornet. 2018. Enabling Indoor Mobile Millimeter-wave Networks Based on Smart Reflect-arrays. In IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. 270--278. Google ScholarDigital Library
- Wade Trappe, Richard Howard, and Robert S Moore. 2015. Low-energy security: Limits and opportunities in the internet of things. IEEE Security & Privacy 13, 1 (2015), 14--21.Google ScholarDigital Library
- Ju Wang, Liqiong Chang, Shourya Aggarwal, Omid Abari, and Srinivasan Keshav. 2020. Soil moisture sensing with commodity RFID systems. In Proceedings of the 18th International Conference on Mobile Systems, Applications, and Services. 273--285.Google ScholarDigital Library
- Song Wang, Jingqi Huang, Xinyu Zhang, Hyoil Kim, and Sujit Dey. 2020. X-array: Approximating omnidirectional millimeter-wave coverage using an array of phased arrays. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (MobiCom). 1--14.Google ScholarDigital Library
- Allen Welkie, Longfei Shangguan, Jeremy Gummeson, Wenjun Hu, and Kyle Jamieson. 2017. Programmable radio environments for smart spaces. In Proceedings of the 16th ACM Workshop on Hot Topics in Networks. 36--42.Google ScholarDigital Library
- Qingqing Wu and Rui Zhang. 2019. Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network. IEEE Communications Magazine 58, 1 (2019), 106--112.Google ScholarDigital Library
- Meng Zhang, Anand Raghunathan, and Niraj K Jha. 2013. MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Transactions on Biomedical circuits and Systems 7, 6 (2013), 871--881.Google ScholarCross Ref
- Qianqian Zhang, Ying-Chang Liang, and H Vincent Poor. 2020. Large intelligent surface/antennas (LISA) assisted symbiotic radio for IoT communications. arXiv preprint arXiv:2002.00340 (2020).Google Scholar
- Renjie Zhao, Timothy Woodford, Teng Wei, Kun Qian, and Xinyu Zhang. 2020. M-cube: A millimeter-wave massive MIMO software radio. In Proceedings of the 26th Annual International Conference on Mobile Computing and Networking (MobiCom). 1--14.Google ScholarDigital Library
- Yue Zheng, Yi Zhang, Kun Qian, Guidong Zhang, Yunhao Liu, Chenshu Wu, and Zheng Yang. 2019. Zero-effort cross-domain gesture recognition with Wi-Fi. In Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. 313--325.Google ScholarDigital Library
- X. Zhou and M. R. Mckay. 2010. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation. 59, 8 (2010), 3831--3842.Google Scholar
- Yulong Zou, Jia Zhu, Xianbin Wang, and Lajos Hanzo. 2016. A survey on wireless security: Technical challenges, recent advances, and future trends. Proc. IEEE 104, 9 (2016), 1727--1765.Google ScholarCross Ref
Index Terms
- Protego: securing wireless communication via programmable metasurface
Recommendations
RFlens: metasurface-enabled beamforming for IoT communication and sensing
MobiCom '21: Proceedings of the 27th Annual International Conference on Mobile Computing and NetworkingBeamforming can improve the communication and sensing capabilities for a wide range of IoT applications. However, most existing IoT devices cannot perform beamforming due to form factor, energy, and cost constraints. This paper presents RFlens, a ...
Near-field phase modulation using a semicircular radially gradient metasurface for beam steering of an RF antenna
A semicircular radially gradient metasurface (SCRGM) structure is proposed to modulate the phase of the electric field of a radiofrequency (RF) antenna in the near field. The metasurface partially covers the antenna aperture, thus facilitating tilting ...
Malicious mmWave reconfigurable surface: eavesdropping through harmonic steering
HotMobile '22: Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and ApplicationsThe use of reconfigurable surfaces is emerging as a promising solution to tackle the blockage and coverage challenges in mmWave networks. However, if such a surface is controlled by an adversary, it could make the wireless network vulnerable to a ...
Comments