Along with the growth of wireless communication systems, the demands for power efficiency for mobile devices and prompt security services for dynamic wireless environment have drawn considerable attention to physical layer security research. Spread spectrum technologies, such as direct sequence spread spectrum (DSSS), were originally developed for this purpose. DSSS spreads out the spectrum of the content signal with, for example, pseudonoise (PN) sequences to resemble white noise. Thus, the DSSS technique offers jamming resistance, interference rejection, message privacy and a number of other desirable properties [1]. For example, a jammer signal is not able to jam the wide-band signal, unless it knows the spread sequence, or the key and algorithm for generating the spread sequence [2]. Specifically with the interference rejection property, DSSS is widely adopted in commercial wireless network standards, such as IEEE 802.11 [3] and IEEE 802.15.4 [4], to provide robust communications. However, these standards make the PN sequences available to the public, and hence do not inherit one of the most important merits of DSSS. Many researchers have managed to complement the physical layer security for commercial DSSS systems, by extending the PN sequence set or manipulating chips in the PN sequences.
This paper surveys three key aspects of DSSS technique in the context of the mobile wireless environment.
First, like symmetric cryptographic keys in conventional network security mechanisms, it is not straightforward to establish the spread sequence between the transmitter and the receiver, without resorting to a fixed infrastructure. This constitutes a challenging research agenda establishing a DSSS channel with no prior negotiation on a shared spread sequence, namely keyless DSSS (Section IV).
Second, DSSS reduces the communication efficiency, because a wider bandwidth than necessary is needed to deliver the same amount of data bits, particularly when the jammer signal is stronger. On the other hand, the reduced communication efficiency can be compensated for by employing a more sophisticated modulation scheme, particularly when the user signal is stronger. Adaptive selection of the spread sequence length and modulation scheme can be performed, based on the jamming and channel conditions (Section V).
Third, one of the widely adopted security techniques in the physical layer is digital watermarking, in which a watermark signal can be embedded into or multiplexed with a content signal [5]. Many physical layer attributes, such as channel coding, modulation schemes and transmission power provide redundancy and randomness that are suitable for embedding watermark information [6]. One promising area in this direction is to utilize the inherent redundancy in DSSS signals to embed watermark information, which we call watermarked DSSS (WDSSS) (Section VI).
The rest of the paper is organized as follows. Section II explains DSSS, and Section III discusses the jamming and anti-jamming mechanisms, which are followed by discussions of the abovementioned three DSSS-based security mechanisms in Sections IV, V, and VI, respectively. The paper concludes with Section VII.
II. DIRECT SEQUENCE SPREAD SPECTRUM
Most of the security mechanisms for wireless networks depend on the intractability assumption and the corresponding computational complexity [7]. In DSSS techniques, it is channel bandwidth that complicates the process of decryption or decoding, because an original signal is spread into a wider bandwidth signal [8].
Fig. 1a shows a generic DSSS system model [9]. In a typical DSSS system, the transmitter first modulates the data signal with a carrier signal, and then spreads the modulated signal, by applying modulo-2 addition to it with a spreading signal. The spreading signal is generated from a PN sequence running periodically at a much higher rate than the original data signal. The spreading operation is shown in Fig. 1b. Each individual digit in the PN sequence is called a chip to be differentiated from the
bit in the data signal, and each period of the PN sequence is used to spread one data bit. Because the PN sequence is designed to resemble white noise, the spectrum of the original signal is spread out. Thus, the spectrum of the spread signal occupies a larger bandwidth than necessary and shows a lower power spectral density than that of the original signal.
Symmetrically, the receiver first performs a correlation process on the incoming signal, that is, it applies the modulo-2 addition to the incoming signal with a synchronized copy of the spreading signal. The receiver then obtains the underlying modulated signal, which is in turn demodulated to recover the original data signal. The duplicating modulo-2 addition provides interference rejection for the DSSS signal if the interference is narrow band, because modulo-2 addition of the narrow band interference with the spreading signal will spread out the power of the interference, and hence will increase the receiving signal-to-noise (SNR) of the signal of interest.
A longer spread sequence must be employed in order to enhance the jam resistance. However, it reduces the communication efficiency accordingly, because a wider bandwidth is utilized to deliver the same amount of data bits. The spread sequence can be generated in two different ways [8]:
Jamming is an unsophisticated technique that can effectively disrupt legitimate user’s communication unless they are equipped with extremely sophisticated detection mechanisms and countermeasures. While DSSS has an antijamming capability, there also exist intelligent jamming strategies that effectively attack a DSSS channel.
>
A. Classification of Jamming Attack
There has been active research on developing effective jammer strategies. For example, [10] studied channeloblivious and channel-aware jammers. Channel-oblivious jammers can jam deterministically at a specified rate (
On the other hand, channel-oblivious jammers are easier to detect but at the same time easier to implement because they emit a radio signal constantly or regularly, without waiting for the channel to be idle. These jammers do not follow or abuse the underlying media access control (MAC) protocol by ignoring interframe spaces or congestion window mechanisms (like in 802.11 standards), and inject normal packets or random bit sequences so as to block all transmissions from legitimate nodes. It can also use normal packets rather than a random signal to disguise itself as a legitimate user. An advantage is that the detection is harder as normal packets are transmitted.
The main goal of a jammer is to interfere with wireless communications between legitimate mobile nodes. It achieves this goal by either blocking the source from sending its own packets or by blocking the receiver from receiving the legitimate packets. They are formulated as
On the other hand, PDR refers to the ratio of the number of packets that are successfully received to the number of packets that are transmitted. This can be measured at the transmitter, because it receives an ACK for each of the successful transmissions. However, PDR can also be measured at the receiver by calculating the number of packets that are successfully decoded to the number of packets that are received; i.e., it counts the packets that have been received and that pass the integrity check such as cyclic redundancy check (CRC). Either way, a low PDR means a strong interference or the presence of a jammer.
Detecting a jammer is challenging because there exist numerous intelligent jammer strategies. PSR and PDR mentioned above can be used as an indication of a jammer. Other MAC and PHY attributes, such as signal strength and carrier sensing time, can be used to detect a jammer when they exhibit abnormal distributions [11]. For example, when a node wishes to transmit, it senses the channel following the underlying MAC algorithm, such as carrier sense multiple access (CSMA). It may declare the presence of a jammer if it does not have the opportunities to transmit its packet for an extended period of time while the channel is continuously intercepted by others, disrupting the fairness in a significant manner.
IV. KEYLESS SPREAD SPECTRUM COMMUNICATION
While the DSSS system supports confidentiality and authentication services, it is difficult to establish a spread sequence in secrecy. Recently, there has been active research on removing the dependency on the secret key at the cost of either increased communication delay or increased decoding delay. For example, they repeat the same message many times for synchronization [12,13]. However, this is also useful in broadcast communication where a sender needs to share a secret key with multiple receivers [13,14]. They include uncoordinated frequency hopping spread spectrum (FHSS) [12], uncoordinated DSSS [13], and randomized differential DSSS [14].
The essential idea is to establish a secret key by exploiting the wireless channel itself since it provides a unique opportunity for the sender and the receiver to create a shared secret information [15-17]. Note that the wireless channel is time-varying and location-specific but is also reciprocal [18,19]. In [20], a new key extraction algorithm is presented, which does not require an authenticated channel. Since the channel fading at the location away more than
from the communicating peers is statistically independent from the peers, channel impulse responses between them are unique and decorrelated rapidly in space. These correlation observations result in a series of bits using the line-crossing algorithm, producing a shared secret information [20]. [17] presents the effectiveness of secret key extraction using received signal strength (RSS) variations, and found that the generated key does not hold a high enough entropy such that an adversary can possibly generate the same key. It proposes an adaptive approach where threshold values are determined adaptively based on the RSS mean and deviation. To make it work, the sender and the receiver accumulates a time series of measured RSS as they exchange packets.
Those algorithms introduced in the previous section can be utilized to generate the spread sequence for DSSS without a prior negotiation between the transmitter and the receiver. However, there were studies in the literature that specifically target keyless DSSS. Several individual works considered expanding the PN sequence set used in a DSSS system [21-23]. In order to enhance the secrecy of the PN sequences, uncoordinated DSSS (UDSSS) [13] randomly picks the spread sequence from a public set. Because of randomly choosing the spreading sequence, attackers cannot know the next spreading sequence that the sender will use to modulate it. However, the sender needs to send a message several times (with different spreading codes) to increase the probability that the receivers get the message, even though they’re not synchronized. And the receiver needs to sample the radio channel and to store it in a buffer, which will be applied with a subset of spread sequences for despreading. The advantage of UDSSS is the ability of communicating both unicast and broadcast under a jamming attack where the standard DSSS cannot. As a tradeoff, the throughput decreases and the latency increases because of sampling and trial-and-error to find the spreading sequence.
Both [21] and [22] also intended to improve the secrecy of the PN sequence. Their methods allow the transmitter and the receiver to generate an identical set of PN sequences with a prior negotiation, and the spreading and correlation processes share a code hopping scheme, which provide a dynamic synchronization between the PN sequences used in the transmitter and the receiver.
Randomized differential DSSS (RD-DSSS) [14] has been proposed to deal with broadcast communication in the presence of jammers. Similar to UDSSS, it uses a public set of spread sequences but modulates data using the correlation of two random spreading sequences. In other words, bit “0” is encoded using two different spreading sequences in the set, while bit “1” is encoded using two identical spreading sequences. Since the public set has been designed to exhibit low correlation (nearly or fully orthogonal) between any two different codes in the set, the receiver despreads the data by interpreting high correlation as “1” and low correlation as “0”.
V. SPREAD SEQUENCE LENGTH AND COMMUNICATION EFFICIENCY ADAPTATION
>
A. Adaptive Modulation and Anti-Jamming Strategy
Adaptive selection of modulation scheme has been a heavily researched subject [24-26]. For example, IEEE 802.11a/g employs binary phase-shift keying (BPSK), quadrature phase-shift keying (QPSK), 16-QAM and 64- QAM, which achieve as much as 36, 72, 144, and 216 data bits per symbol, respectively [3]. Typically, the best modulation scheme and the corresponding data rate are determined based on a trial-and-error approach. In
transmission failures and increases its data rate (more bits per symbol) upon a number of consecutive transmission successes.
As discussed in the Introduction section, a certain scenario allows the employment of such a more sophisticated modulation scheme, which has the potential to compensate for the reduced communication efficiency due to the redundant use of bandwidth as in DSSS. The jammer scenario is a command-and-control scenario, where the jammer chases the transmitter in order to effectively analyze and jam the legitimate communication as shown in Fig. 2. Both the sender and the receiver monitor the communication channel, and they can adaptively change the modulation scheme and the spread sequence length based on the condition of the communication link.
The objective is for the sender and the receiver to communicate at or below the required jam resistance (bit error rate [BER] performance of 10-6). They desire to acquire the maximum communication efficiency (high data rate,
We have investigated the implementations of the abovementioned adaptation scheme in the context of Universal Software Radio Peripheral (USRP; Ettus Research, Mountain View, CA, USA) [28], and GNU Radio [29].
The core of the USRP is a motherboard with two highspeed analog to digital converters (ADCs) and digital to analog converter (DACs), and a Xilinx Spartan field programmable gate array (FPGA). The ADCs/DACs are connected to the daughterboards, while the FPGA is connected to a host purpose computer running GNU Radio via a Gigabit Ethernet interface. We used the implementation of 802.11b from BBN Technologies Company [30]. Pulse jammer is used with a pulse width of 220 μsec and the period of 10,000 μsec. Fig. 3a compares the BER performance of DSSS and no-DSSS with varying jammer amplitude. The figure includes trend lines as well in order to mask experiment errors, which is typical in practical experiments, and thus to better capture the general trend of the experiment results. According to the chart, the BER increases with the jammer’s amplitude as expected. It is important to contrast it with the theoretical results in Fig. 3b, which exhibit a similar pattern. Note that the
BER ranges in Fig. 3a and b are not the same, which is due to the complex wireless propagation phenomenon in reality.
On the other hand, Fig. 4 shows the BER curve for several modulation schemes (data rates). In Fig. 4b, the SNR/signal-to-interference (SIR) requirement for the target BER of, for example, 10-5 is 2.2, 5.2, 6.4, and 7.6 dB, for 1, 2, 5.5, and 11 Mbps, respectively. In other words, users are not allowed to use a high data rate under a bad channel condition or a communication in the distance. Combining this with Fig. 3, there is a tradeoff between jam resistance and the communication efficiency considering the 3-node scenario in Fig. 2. Please refer to [27] for more results.
The goal for designing a WDSSS technique is to embed secret information in the PN sequences of the
DSSS technique, so as to complement the physical layer security for a DSSS system with publicly known PN sequences. Two fundamental premises for WDSSS techniques are the error correcting capability of PN sequences and the correlation procedure of the DSSS receiver. The error correcting capability of PN sequences implies coding redundancy in good communication environments. The coding redundancy can consequently be exploited to carry additional information without requiring extra bandwidth.
A WDSSS technique consists of two major operations, watermark embedding and extraction, which are placed in a transmitter and an
There has been specific work devoted in physical layer watermarking research, combining the watermarking technique with various physical layer properties. Goergen et al. [31] generated the watermark signal from a finite length synthetic FIR channel response. [32] proposed to generate the watermark signal from the application of a robust Hash function on the content signal and a secret key, and then superimpose the watermark signal onto the content signal at a lower power level. Two physical layer watermarking techniques were proposed in [33], applied to the payload or the cyclic time of an orthogonal frequency- division multiplexing (OFDM) signal. The first method spreads modulated watermark bits with a Gaussian distributed PN sequence, and then superimposes them onto the OFDM payload data with a low power level. The second method uses positive and negative cyclic time shifts to represent Manchester encoded watermark bits.
Another physical layer watermarking method proposed in [34] embeds a watermark signal in the
Other WDSSS schemes are found in [35-37], managing to construct a covert channel on top of plain DSSS communications by manipulating the PN sequences. For example, the coding redundancy in PN sequences is exploited to assign a certain amount of chips in a PN sequence to represent secret data [35]. The proposed work in [36] presented the encoding scheme of embedded data bits to minimize the effect of embedded signal on the content signal. The encoding scheme is to expand each original PN sequence into a cluster of PN sequences that are closer to the corresponding original PN sequence than to any other PN sequences in the original set. The cluster is then used to represent embedded data bits. The work introduced in [37] is based on [35] and adopts the Hamming distance method used in [36]. They provided additional discussion in terms of error correcting capability in the codeword design, and suggested the utilization of all chip position combinations to carry secret information and to recover the secret information through the altered chip positions information. Thus, the size of the covert
Maximized minimum distance method: a set of modified pseudonoise (PN) sequences for the 11-chip Barker sequence (00011101101) with 3 flipped chips
communication alphabet is equal to the sum of combinations of each possible number of altered chips. They further deduced an optimal number of altered chips for the purpose of interference resistance.
>
C. Watermark Embedding Methods
A typical WDSSS technique embeds watermark information by flipping chips on designated positions, and thus it is important to establish a mapping relationship between the watermark data bits and the chip positions in the PN sequence. One simple method is to exhaustively use all combinations of chip positions to represent watermark data bits. For a PN sequence of length
Thus, the number of watermark bits that can be represented by one modified PN sequence is
Because one PN sequence is equivalent to one content data bit, this embedding method can provide a much higher watermark data rate than the content data rate.
The Maximized Minimum Distance Method chooses code words with inter-code Hamming distance less than or equal to a certain limit to guarantee optimal error correcting capability. Table 1 shows a set of modified PN sequences for the 11-chip Barker Sequence with 3 flipped chips. The resulting set has a minimum distance of 6.
The subsequence method is another one. It divides the PN sequence into several subsequences, flips one chip in each subsequence, and then combines flipped chips together to represent a watermark value. Table 2 shows an example of the subsequence embedding method to flip up to 4 chips in the 11-chip Barker Sequence. This method also can provide security for the watermark information, because the subsequence dividing scheme is a shared secret between the transmitter and the aware receiver. As
[Table 2.] Subsequence watermark embedding method for 11- chip pseudonoise sequence
Subsequence watermark embedding method for 11- chip pseudonoise sequence
shown in Table 2, this method provides high embedding capability. However,od does not provide errorcorrecting capability for the watermark signal, because the minimum distance is 2 in the sets of modified PN sequences.
The performance of a digital communication system is usually evaluated by the BER. The BER of the WDSSS content signal is related to the BER of the underlying DSSS signal. This paper implements the DSSS spreading operation after the differential encoding in the transmitter, and places the DSSS correlation process before the differential decoding in the receiver; therefore, the actual transmitted and received signal is modulated and demodulated with BPSK. In order to be consistent with the measured experimental results, the theoretical BER is converted into packet error rate (PER): PER = 1 - (1 - BER)8
flipped chip is 1.96 dB.
The corresponding experimental results are shown in Fig. 6b. Because the estimated SNR values used in the experiments are different from the actual SNR values from the USRP2 platform, there is an approximate 2 dB SNR difference between the theoretical results and the experimental results. Except for this SNR offset, the experimental results show that to maintain the acceptable 10% PER, the required SNR increases 1.45 dB for 1-chip flipping, increases another 1.85 dB for 2-chip flipping, increases another 2.4 dB for 3-chip flipping, and increases another 2.25 dB for 4-chip flipping. On average, the extra SNR required for each additional flipped chip is 1.99 dB, which is similar to the theoretical result. Please refer to [38] for more details.
VII. CONCLUSION AND FUTURE WORK
With the increasing use of wireless communication, it is becoming more important to provide secure and robust communications in the presence of attackers. This paper surveys several physical layer techniques based on DSSS. Since it is still hard to establish a shared spread sequence between the sender and the receiver, Section IV discusses previous work in addressing this issue.
This paper also presents an adaptive scheme for modulation and anti-jamming capability, where the sender and the receiver adaptively change the modulation scheme and spread sequence length with changing channel condition. Since they experience the same channel, this can be used to independently deduce the same spread sequence length, which is an additional hurdle for the jammer, as it experiences a different channel. This is the main theme in Section V. In the future, we will develop a complete adaptation algorithm that makes a prudent tradeoff between communication efficiency and jam resistance.
Another important agenda in this paper is the WDSSS in Section VI. The WDSSS technique flips chips at designated positions in the PN sequence to convey authentication information. Thus, it provides additional physical layer security to the DSSS system without requiring extra bandwidth. A literature survey is followed by theoretical analysis as well as experimental results on the performances of the WDSSS. The impact of flipped chips on the performance of content signal was quantitatively measured, and indicated that, for the 11-chip PN sequence, an approximately 2 dB extra SNR is required for each additional flipped chip.
Considering that the performance of the WDSSS system is closely related to the channel quality, an adaptive chip flipping options scheme can be designed to balance the content signal quality and the watermark signal throughput. With this scheme, the chip flipping option gets increased when the channel quality reaches a set of thresholds, and gets decreased when the channel quality deteriorates. Note that the watermark signal gives priority to the content signal so that the system performance can be maintained at an acceptable level.