Chaos Based Constellation Scrambling in OFDM Systems: Security Interleaving Issues
Chaos Based Constellation Scrambling in OFDM Systems: Security Interleaving Issues
Chaos Based Constellation Scrambling in OFDM Systems: Security Interleaving Issues
Interleaving Issues
Emails:lasf_kh@yahoo.com.2engrasimkhan@gmail.com.
3varun-ieoti@petronas.com.my, 4engr.shahid@gmail.com
978-1-4244-2328-6/08/$25.00eJ2008 IEEE
random interleaver is increased with decrease in unique combination. The matrix when multiplied with
spreading factor as the size is increased. To improve the constellation symbols scrambles the position of the
design of interleaver for memory efficient applications, elements. It is difficult to recover the data with different
interleaver is constructed algebraically because their key.
scrambling pattern is completely specified by a well
define mathematical formula with a few seeding
parameter but does not have good random properties [15, III. CHAOS BASED SCRAMBLING
16]. a) Chaotic logistic Map
The Chaotic logistic map is a well known 1-0 chaotic
This paper proposes a unique chaos based scrambling map. Since the chaotic logistic map is convenient to
of OFOM constellation symbols for securing system at implement, we have selected it for demonstrating our
PHY layer. In addition, this scrambling algorithm also scrambling algorithm. However, it should be mentioned
acts as random interleaver. It has good random properties that even other 1-0 chaotic maps can be employed for
and it is also memory efficient because it can also scrambling purpose - maps which have uniform
comp1etely specified by a mathematical formula, which is probability distribution functions such as Piecewise linear
logistic map in our case. All the previous techniques for chaotic maps [18-20].
securing such systems are employed at higher sub layers.
The scrambling is reversible with the use of symmetric The chaotic logistic map is given by (4)
key. It uses 1-0 chaotic map to generate the scrambling
matrix. The initial condition of 1-0 chaotic logistic map x n + 1 = rx n (1 - x n ) (4)
serves as key to generate scrambler. The results show that
all data are recovered with zero error. The proposed
where 0 < x n < 1 and 3.47 < r < 4
scrambling method is extremely sensitive to the initial
conditions, hence, with different initial conditions, it is By iterating the chaotic logistic map with a unique
unable to recover the data correctly and, in the erroneous initial value 0 < xO < 1
data deciphered, the probability of occurrence of the each
constellation symbol is uniform
b) Scrambling Algorithm
This paper is organized as follows: Section 2 describes The block diagram of our proposed Chaos Based
the proposed scrambling based security. Section 3 Scrambling (CBS) scheme is given in fig.2. The chaotic
describes the proposed chaos based scrambling logistic map produces chaotic sequence within the
algorithm. Section 4 describes security analysis. Section domain E (0,1). The scrambling matrix is generated in
V describes the interleaver analysis. The last section following way. A new position matrix P of size 1 x N as
concludes the paper. in (5) is generated, where position elements signify the
location of' l' in scrambling matrix.
II. SCRAMBLING BASED SECURITY
P = {Pi,Pi+l,·" ,PN} (5)
The scrambling reorders the constellation symbols in an
OFOM system. The scrambling matrix can be visualized
as in eq.3. The matrix design is in such a way that each where Pi are the position elements.
row has one '1' and rest of the elements are zero and no
two rows are same. For N x N matrix, possible The design methodology of position matrix is based on
combinations are there. For each scrambling matrix new the so-called mixing property of the chaotic dynamical
key is used, each key entails mapping to a systems. A bit more formally, the mixing property is
defined in the following way [21]:
• For any two open intervals I and J (lvhich can be
0 0 1 0 0 0 arbitrarily small, but must have a nonzero length) one
0 0 0 0 1 0 can find initial values in 1 lvhich, lvhen iterated, lvill
0 1 0 0 0 0 eventually lead to points in J
s= 0 0 0 0 0 1
(3)
Hence according to the mixing property, for any initial
1 0 0 0 0 0 condition Ie, from any interval 1, a chaotic dynamical
0 0 0 1 0 0 system will traverse all the intervals chaotically during
the course of the iterations.
978-1-4244-2328-6/08/$25.0002008 IEEE
To generate the dynamic position matrix, domain the OFDM baseband signal by applying the IFFT,
E (0,1) is equally divided into subdomains. Each
subdomain is sequentially numbered from 0 to N-l. Now X n = IFFT{X e } (10)
starting with the initial condition Ie, a new position
matrix is generated by iterating the chaotic dynamical where, X n is the frequency domain vector signals
system. During the course of iteration, when the chaotic
respectively. At receiver same procedure follows to
logistic map falls in the specific subdomain, the number
descramble the constellation symbols.
assigned to that subdomain is being stored in the new
position matrix. If the chaotic map has already traversed
the specific subdomain or interval, then the position IV. SECURITY ANALYSIS
corresponding to that subdomain is being ignored. Hence
iterations will continue until the chaotic map traverses all Wireless LANs are highly susceptible to numerous
the subdomains. malicious attacks. In wireless system layer abstraction is
very important concept, requiring each layer to provide
Finlllly the scrambling matrix S of size N x N is independent fu'nctionality separately to strengthen the
generated by using position matrix generated by the security of the system. At link layer and higher layers
above mentioned methodology. The complete scrambling security mechanisms are used to protect the transmission
matrix after assigning each position is written as data in order to prevent attacker to manipulate useful
information. Even if the strong confidentiality and mutual
authentication protocols
Si,k Si,k+l Si,N
Si+l,k Si+l,k+l Si+l,N
Si,k =
(6)
SN,k SN,k+l SN,N
T
S -{S·
- Z' S·z+,
1··· , SN}
(7)
S E [i,N] are used at MAC layer, it still leaves many weak spots for
attacker to explore. At MAC layer only data frames are
encrypted while leaving management and control frames
This scrambling matrix is reversible to correctly unprotected. In addition, MAC headers are also left
recover the data with symmetric key. unencrypted. In what follows, it is shown that by
providing the security at the physical layer by the
c) Proposed OFDM System. proposed CBS which scrambles the complete MPDU
The proposed OFDM System shown in Fig. 1 can be (MAC Protocol Data Unit) frame, how the Wireless LAN
easily implemented. The scrambling matrix is multiplied can be made secure against some of the current
with N randomly generated symbols as, prevailing threats.
encrypted form of Ji and P2 , respectively. Here Cm TABLE 1: Dispersion and spread of proposed CBS
servers as equivalent to the secret key and can be called as
mask frame. Initial Min.
length Dispersion
condition Spread
However, if the frames are being encrypted (permuted)
by the encryption algorithm using different secret keys
0.1111 64 - 128 0.81308-0.81299 1
(initial conditions/control parameters), then the
corresponding input differential lui will not be equal to 0.234 64 - 128 1
0.81399-0.81435
the corresponding output differential ~Yi. Hence the
adversary will not be able to recover the second frame (or 0.334 64 - 128 0.82887-0.8222 1
set of data) P2 using em even ifhe has the access to li.
0.505 64 - 128 0.83234-0.81225 1
From the above discussion, it is obvious that it is not
possible to break CBS using known plaintext attack if the
0.723 64 - 128 0.82341-0.81004 1
frames are scrambled using different secret keys.
978-1-4244-2328-6/08/$25.0002008 IEEE
0.8020 64 - 128 0.81696-0.81705 1 [6]. W. Arbaugh, N. Shankar, and Y. C. W. Justin Wan, "Your
802.11 Wireless Network has No Clothes," Department of
Computer Science, UMCP, March, 2001.
0.999 64 - 128 0.8234-0.81348 1
[7]. S. Fluhrer, L. Mantin, and A. Shamir. Weaknesses in the key
scheduling algorithm of RC4. the Eighth Annual Workshop
on Selected Areas in Cryptography, August 2001.
[8]. Stubblefield, 1. Ioannidis, and A. Rubin. Using the Fluhrer,
Mantin, and Shamir Attack to Break WEP. AT&T Labs
generation of the scrambling matrix of our proposed Technical Report, August 2001.
scrambling algorithm is based on the so called mixing [9]. D. Verton. Your Wireless LAN Can Be Hacked - Flaws in
property of the chaotic dynamical systems. The proposed 802.11 can leave data vulnerable. PCWorld.com.
method is extremely sensitive to the initial condition, [10]. Y. Xiao, C. Bandela, Y. Pan. Vulnerabilities and Security
Enhancements for the IEEE 802.11 WLANs. IEEE globecom
hence slightly different initial condition results in almost
proceeding. 2005
completely different position matrix. It is shown that by [11]. Y. Xiao, Y. Pan, X. Du, C. Bandela and K. Dass. Security
scrambling the transmission data could help to resist mechanism, attacks, and security enhancements for the IEEE
against DoS attacks. Securing PHY layer enhance the 802.11 WLANs. Submitted to international journal of wireless
and mobile lomputing, special issue on Medium Access Control
securitY at MAC layer. Our propose scheme helps to
for WLANs, PANs and Sensor Network, February. 2005
assist upper layers, strength security and resist against [12]. 1. Bellardo, S. Savage 802.11 Denial-of-Service attacks: Real
DoS attacks. Data privacy and data forgery attacks can be vulnerabilities and practical solution. Usenix Security
prevented. PHY layer security by our propose scheme Symposium. 2003.
[13]. A. Goldsmith, wireless communication. Cambridge university
substantially increase the entry barrier for break in. As
press, 2005.
interleaver, our CBS has good random interleaver [14]. J. D. Andersen, Turbo code tutorial,
properties. It is memory efficient because its scrambling www.coe.montana.edu/ee/rwolff/EE548/EE548-06/turbocodes/
pattern completely defined by mathematical formula. turbotutorial. pdf
[15]. C. A. Leon, analysis of dispersion and spreading properties of
Also permutation has its own inverse, same algorithm is
interleavers for turbo codes. Computer research conference,
used for both interleaving and deinterleaving. Our April 2004
proposed CBS can easily be constructed for any [16]. Y. B. Luis, L. O. Peraz, I. Rubio, Properties of a class of
interleaving size permutations over finite fields and applications to turbo codes.
PRISM. 2004.
[17]. S. Dolinar,D. Divsalar, Weight distribution for turbo codes
using random and nonrandom permutations. The
REFERENCES telecommunication and data acquisition progress report 42-122,
April-june 1995.
[1]. T. Karygiannis, L. Owens. Wireless Network Security 802.11, [18]. A. Baranovsky and D. Daems. The design of one dimensional
Bluetooth and Handheld Devices. National Institute of chaotic maps with prescribed statistical properties. International
Standards (NIST) special publication 800-48, November 2002. journal of bifurcation of chaos & fractals, Vol 5, No.6,
[2]. K. Hiltunen. WLAN attacks and risks. pp.1585-1598, 1995.
www.comlab.hut.fi/opetus/333/2004slides/topic30.pdf. [19]. M. Asim. A Hybrid chaotic image encryption scheme based on
[3]. Y. Xiao, Y. Pan, X. Du, C. Bandela, K. Dass Security S-box and ciphertext feedback. Master thesis, Universiti
mechanism, attacks, and security enhancements for the IEEE Teknologi, PETRONAS, 2007.
802.11 WLANs. Submitted to international journal of wireless [20]. M. Asim & V. Jeoti. Hybrid chaotic image encryption scheme
and mobile computing, special issue on Medium Access Control based on S-box and ciphertext feedback. To appear in IEEE,
for WLANs, PANs and Sensor Network, February. 2005. International conference on Intelligent and Advanced Systems,
[4]. C. He, 1. C. Mitchell security analysis and improvements for 2007.
802.1 Ii. The 12th Annual Network and Distributed System [21]. Peitgen, Jurgens and Saupe. Chaos and Fractals-New Frontiers
Security Symposium (NDSS'05), pages 90-110. February. 2005 of Science, Second Editon, Springer-Verlag, 2004.
[5]. Stubblefield, 1. Ioannidis, and A. Rubin. Using the Fluhrer,
Mantin, and Shamir Attack to Break WEP. AT&T Labs
Technical Report, August 2001.
978-1-4244-2328-6/08/$25.0002008 IEEE