skip to main content
research-article

Wireless Latency Shift Keying

Published: 29 May 2024 Publication History

Abstract

IEEE 802.11 (WiFi) only has two modes of trust---complete trust or complete untrust. The lack of nuance leaves no room for sensors that a user does not fully trust but wants to connect to their network, such as a WiFi sensor. Solutions exist, but they require advanced knowledge of network administration. We solve this problem by introducing a new way of modulating data in the latency of the network, called Latency Shift Keying. We use specific characteristics of the WiFi protocol to carefully control the latency of just one device on the network. We build a transmitter, receiver, and modulation scheme that is designed to encode data in the latency of a network. We develop an application, Wicket, that solves the WiFi trust issue using Latency Shift Keying to create a new security association between an untrusted WiFi sensor and a wired device on the trusted network. We evaluate its performance and show that it works in many network conditions and environments.

References

[1]
2013. https://www.cisco.com/assets/sol/sb/WAP561_Emulators/WAP561_Emulator_v1.0.4.1/help/Wireless12.html
[2]
2021. IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Networks-Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016) (2021), 1--4379.
[3]
2022. https://en.wikipedia.org/wiki/Wicket_gate
[4]
2022. Linux Wireless - Monitor Mode. Retrieved August 24, 2023 from https://wireless.wiki.kernel.org
[5]
2023. https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-reference/network/esp_dpp.html
[6]
Utku Günay Acer and Otto Waltari. 2017. WiPush: Opportunistic Notifications over WiFi without Association. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2017). Association for Computing Machinery, New York, NY, USA, 353--362.
[7]
Salah A. Alabady, Fadi Al-Turjman, and Sadia Din. 2020. A Novel Security Model for Cooperative Virtual Networks in the IoT Era. International Journal of Parallel Programming 48, 2 (April 2020), 280--295.
[8]
Amazon. 2023. Amazon Frustration-Free Setup Frequently Asked Questions. https://www.amazon.com/gp/help/customer/display.html?nodeId=GMPKVYDBR223TRPY
[9]
Ioannis Antzoulis, Md Minhaz Chowdhury, and Shadman Latiff. 2022. IoT Security for Smart Home: Issues and Solutions. In 2022 IEEE International Conference on Electro Information Technology (eIT). 1--7.
[10]
Ioannis Antzoulis, Md Minhaz Chowdhury, and Shadman Latiff. 2022. IoT Security for Smart Home: Issues and Solutions. In 2022 IEEE International Conference on Electro Information Technology (eIT). 1--7.
[11]
Philippe Biondi. 2023. Welcome to Scapy's documentation! https://scapy.readthedocs.io/en/latest/
[12]
Kameswari Chebrolu and Ashutosh Dhekne. 2009. Esense. Proceedings of the 15th annual international conference on Mobile computing and networking (2009).
[13]
Cisco. 2010. Voice Over Wireless LAN (VoWLAN) Troubleshooting Checklist. https://www.cisco.com/c/en/us/td/docs/wireless/technology/vowlan/troubleshooting/VoWLAN_Troubleshooting_Checklist.html
[14]
Cisco. 2022. Cisco annual internet Report - Cisco Annual Internet Report (2018--2023) White Paper. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html
[15]
Jon Dugan, Seth Elliott, Bruce A. Mah, Jeff Poskanzer, and Kaustubh Prabhu. 2023. iPerf - The ultimate speed test tool for TCP, UDP and SCTP. https://iperf.fr
[16]
Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald J. Popek, Venkatraman Ramakrishna, and Peter L. Reiher. 2003. WiFi Nomads and their Unprotected Devices : The Case for QED --- Quarantine, Examination, and Decontamination. https://api.semanticscholar.org/CorpusID:16546812
[17]
Matthew S. Gast. 2005. 802.11 Wireless Networks: The Definitive Guide (2nd ed.). O'Reilly Media, Inc.
[18]
Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia, and Can Que. 2010. Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs. IEEE Transactions on Parallel and Distributed Systems 21, 7 (2010), 897--910.
[19]
Vishal Gupta and Mukesh Kumar Rohil. 2013. Bit-stuffing in 802. 11 beacon frame: Embedding non-standard custom information. International Journal of Computer Applications 63, 2 (2013).
[20]
Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, and Dave Levin. [n.d.]. Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet. Network and Distributed Systems Security (NDSS) Symposium ([n. d.]).
[21]
Md. Alamgir Hossain and S. M. A. Islam. 2012. PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MULTIUSER ENVIRONMENT. https://api.semanticscholar.org/CorpusID:61268232
[22]
Jacob Johnson. 2024. Wireless Latency Shift Keying Repository. https://github.com/NET-BYU/wireless-latency-shift-keying
[23]
Bryce Kellogg, Aaron Parks, Shyamnath Gollakota, Joshua R. Smith, and David Wetherall. 2014. Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices. In Proceedings of the 2014 ACM Conference on SIGCOMM (SIGCOMM '14). Association for Computing Machinery, New York, NY, USA, 607--618.
[24]
Song Min Kim and Tian He. 2015. Freebee. Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (2015).
[25]
Constantinos Kolias, Georgios Kambourakis, Angelos Stavrou, and Jeffrey Voas. 2017. DDoS in the IoT: Mirai and other botnets. Computer 50, 7 (2017), 80--84.
[26]
Sanjeev Kumar. 2007. Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet. In Second International Conference on Internet Monitoring and Protection (ICIMP 2007). 25--25.
[27]
Heju Li, Xin He, Xukai Chen, Yinyin Fang, and Qun Fang. 2019. Wi-Motion: A Robust Human Activity Recognition Using WiFi Signals. IEEE Access 7 (2019), 153287--153299.
[28]
Philip Lundrigan, Sneha Kumar Kasera, and Neal Patwari. 2018. Strap: Secure transfer of association protocol. 2018 27th International Conference on Computer Communication and Networks (ICCCN) (2018).
[29]
Philip Lundrigan, Neal Patwari, and Sneha K. Kasera. 2019. On-Off Noise Power Communication. In The 25th Annual International Conference on Mobile Computing and Networking (MobiCom '19). Association for Computing Machinery, New York, NY, USA, Article 35, 14 pages.
[30]
Gordon Lyon. 2023. Nmap. https://nmap.org
[31]
D.V. Sarwate and M.B. Pursley. 1980. Crosscorrelation properties of pseudorandom and related sequences. Proc. IEEE 68, 5 (1980), 593--619.
[32]
Sir Gawain. 2011. South gate of Friedestrom Castle with its wicket (pedestrian entrance). https://commons.wikimedia.org/w/index.php?curid=26781952
[33]
Kaixin Sui, Siqi Sun, Yousef Azzabi, Xiaoping Zhang, Youjian Zhao, Jilong Wang, Zimu Li, and Dan Pei. 2016. Understanding the Impact of AP Density on WiFi Performance Through Real-World Deployment. In 2016 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN). 1--6.
[34]
J. Udhayan and R. Anitha. 2009. Demystifying and Rate Limiting ICMP hosted DoS/DDoS Flooding Attacks with Attack Productivity Analysis. In 2009 IEEE International Advance Computing Conference. 558--564.
[35]
Otto Waltari and Jussi Kangasharju. 2020. Prongle: lightweight communication over unassociated wi-fi. In Proceedings of the 35th Annual ACM Symposium on Applied Computing (SAC '20). Association for Computing Machinery, New York, NY, USA, 994--1001.
[36]
Wei Wang, Alex X. Liu, Muhammad Shahzad, Kang Ling, and Sanglu Lu. 2015. Understanding and Modeling of WiFi Signal Based Human Activity Recognition. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking (MobiCom '15). Association for Computing Machinery, New York, NY, USA, 65--76.
[37]
Huan Yan, Yong Zhang, Yujie Wang, and Kangle Xu. 2020. WiAct: A Passive WiFi-Based Human Activity Recognition System. IEEE Sensors Journal 20, 1 (2020), 296--305.
[38]
Zhimeng Yin, Wenchao Jiang, Song Min Kim, and Tian He. 2017. C-morse: Cross-technology communication with Transparent Morse coding. IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (2017).

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and Networking
May 2024
733 pages
ISBN:9798400704895
DOI:10.1145/3636534
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 May 2024

Check for updates

Badges

Author Tags

  1. wireless subprotocol
  2. IoT
  3. sensor networks
  4. 802.11
  5. wifi

Qualifiers

  • Research-article

Funding Sources

  • NSF

Conference

ACM MobiCom '24
Sponsor:

Acceptance Rates

Overall Acceptance Rate 440 of 2,972 submissions, 15%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 192
    Total Downloads
  • Downloads (Last 12 months)192
  • Downloads (Last 6 weeks)52
Reflects downloads up to 23 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media