1 Introduction

Eavesdropping and man-in-the-middle attacks are serious security threats in wireless communication. Encryption schemes at the software layer such as Wi-Fi Protected Access (WPA/WPA2) have been previously compromised [1]. Although WPA3 is designed to be resistant to brute force attacks, the Dragonblood Attack exploited the vulnerabilities of WPA3 to dictionary, group downgrade, and side-channel attacks [2]. Further security methods must, therefore, be developed to protect communication systems.

Physical layer security provides additional protection of wireless communication between devices. The security techniques implemented at the physical (PHY) layer are used to complement and strengthen security protocols at higher layers. PHY layer security consists of two primary components: key generation and encryption [3]. Secret keys are generated using properties of the wireless channel to help secure a communication link. Encryption in this context consists of encoding signals by introducing strategic modifications to stages within the transceiver pipeline to secure the communication channel. This work explores PHY layer encryption of Orthogonal Frequency Division Multiplexing (OFDM) signals, which is a widely adopted communication technique [4].

OFDM is a digital multi-carrier transmission scheme used in IEEE 802.11 (Wi-Fi), IEEE 802.16 (WiMAX), Long Term Evolution (LTE) Advanced, New Radio (5G NR), and various other communication systems [5]. Advantages of OFDM include high spectral efficiency, resistance to severe channel conditions, and an efficient implementation using the Fast Fourier Transform (FFT). However, OFDM has reduced temporal efficiency, high peak to average power ratio, and is highly sensitive to frequency offsets.

A method is developed to secure wireless OFDM communication links by inducing frequency offsets to the payload portion of the packet. Carrier frequency offset (CFO) occurs due to a mismatch between local oscillators of radios and a Doppler shift resulting from movement of the radios. OFDM signals are negatively impacted by CFO as the shifts in frequency result in a loss of orthogonality between sub-carriers, which leads to performance degradation. The frequency synchronization requirements of OFDM are leveraged to secure communications using PHY layer encryption. In the scenario in which a user Alice attempts to communicate securely with Bob, she can prevent an eavesdropper Eve from recovering her original message by using encryption as shown in Fig. 1. Alice and Bob share a common key, whereas Eve’s key differs. Such a key can be generated at the PHY layer using properties inherent to the wireless medium, as described in Section 4. Specifically, keys that are generated using frequency domain channel estimates and CFO values are considered, as measured by the synchronizer. The wireless channel between a pair of nodes is uncorrelated from the channel observed by an unintended node, assuming that the third party is separated by a distance of at least half the signal wavelength. For a carrier frequency of 2.4GHz, the minimum distance corresponding to a half wavelength is 6.25 cm, which indicates a fair practical assumption. The CFO is also a feature that is unique to a pair of nodes, based on the RF hardware used by each system. The channel estimates and CFO are exclusive to the specific communication link. Therefore, an eavesdropper is unable to reproduce the matching key, despite having knowledge of the algorithm applied to generate keys. However, the use of other keys matching the requirements of the application are also plausible. Next, an algorithm is developed that uses the generated key along with the measured mean CFO value to induce frequency shifts during wireless communication—which are applied at different granularities to the payload of an OFDM packet. Bob uses the previously agreed-upon key to recover the frequency shifts and compensate for the offsets, thereby decrypting the original signal from Alice. Eve, however is not able to decrypt the original signal despite knowing all of the implemented techniques, algorithms, and system parameters used. The key that Eve generates does not match that of Alice and Bob, and results in Eve applying incorrect frequency shifts to the intercepted signal. Eve’s ability to recover the signal is impacted by the loss of orthogonality between sub-carriers upon receiving the sent signal, which results from the mismatch in frequency shifts calculated by Alice and Eve.

Fig. 1
figure 1

Communication scenario of interest. Alice is the transmitter with Bob and Eve acting as receivers. Alice encrypts her signal, which Bob decrypts using the matching key, while Eve is unable to decrypt the signal with her key

The developed methods described in this paper are applicable to OFDM-based communication systems, including Wi-Fi, cellular, and Internet of Things (IoT) devices. Future home IoT devices are slated to use Wi-Fi Easy Connect, in which the edge devices are connected to tablets or cell phones [6]. There are possible security vulnerabilities with the Easy Connect architecture, in which a low-cost device is targeted and leveraged to compromise other components on the network. The proposed techniques are suitable for IoT devices constrained by lower processing capability.

To the best of our knowledge, this is the first technique to artificially induce frequency shifts at the PHY layer for encryption during wireless communication, which provides a method of low-complexity to secure OFDM-based wireless communication links. The rest of the paper is organized as follows. Background on OFDM transmitter and receiver design is provided in Section 2. Both the system and threat models are introduced in Section 3. A policy for key generation and management is described in Section 4. Encryption and decryption techniques as well as the hardware implementation of each are described in Sections 5 and 6, respectively. The performance of the proposed technique to secure the channel is evaluated in Section 7. Related work is discussed in Section 8, and concluding remarks are provided in Section 9.

2 OFDM System Design

The baseband components of a standard OFDM transmitter and receiver are described in this section.

2.1 Transmitter Operation

The existing modules of an OFDM transmitter and the location of the proposed encryption scheme in the pipeline is shown in Fig. 2. Standard components that currently exist in OFDM transmitters are shown in blue, while the proposed module and the corresponding inputs from higher layers of the protocol stack are in red stripes. An OFDM transmitter consists of an input bit stream, which undergoes coding when redundancy is introduced for forward error correction (FEC) and interleaving is applied to reduce the effects of burst errors. The coded or uncoded bits are passed into either a quadrature amplitude modulator (QAM) or a phase shift keying (PSK) modulator to produce frequency domain symbols. A serial to parallel converter is then applied to generate N streams, representing the total number of sub-carriers available. Pilot tones, which are reserved reference values used for training purposes, are then inserted into the appropriate locations. The parallel streams of frequency domain symbols undergo an N-point Inverse Fast Fourier Transform (IFFT) operation that results in time-domain values. The proposed security operation is described in Section 5 and is not a standard component of a transmitter. A cyclic prefix is appended to the time-domain parallel data by repeating a set number of values from the end of the IFFT to the beginning of the output, which reduces the effects of inter-symbol interference (ISI). In addition, the use of a cyclic prefix allows for a circular convolution of the resulting signal with the channel rather than a linear convolution. A parallel to serial converter is then used to form the payload of the OFDM signal. Training data is appended to the beginning of the signal for synchronization and equalization at the receiver. The baseband OFDM signal is converted to the analog domain and is up-converted to a carrier frequency for transmission.

Fig. 2
figure 2

System transmitter design. Proposed modifications to the OFDM pipeline are shown in red stripes

2.2 Receiver Operation

The standard OFDM receiver modules and proposed inputs to the decryption scheme are shown in Fig. 3. Standard components are shown in blue, with the modified synchronizer module and higher layer inputs in red stripes. The baseband signal is extracted by down-converting and digital sampling the received signal at the carrier frequency. Timing and frequency synchronization is implemented by applying a joint algorithm that utilizes the received preamble and known reference signals. Details of the proposed decryption method and modified synchronizer are provided in Section 6. A serial-to-parallel conversion is performed after synchronization to form the same number of streams that were utilized by the transmitter, while the samples used for synchronization are removed. The samples used for the cyclic prefix are discarded prior to performing the FFT operation. The use of the FFT provides significant benefit to OFDM systems, as alternative multi-carrier demodulation techniques require the use of a large number of parallel band pass filters. Channel estimation is performed by dividing the received frequency domain training data with the original reference values known to the receiver. Under the assumption that the length of the cyclic prefix is at least one less than the length of the channel, simple channel estimation using single tap complex values per sub-carrier is possible due to the properties of circular convolution. The resulting channel estimates are utilized to equalize the remaining frequency domain payload data. Phase tracking is performed on the payload data using the embedded pilot tones as reference signals. After correction techniques are applied, the values of the pilot tones are separated from the payload symbols. A parallel-to-serial conversion is performed prior to the demodulation of the symbols to recover the bits. The implemented demodulator corresponds to the QAM or PSK modulator used by the transmitter. Finally, decoding and interleaving techniques are applied if forward error correction was implemented, which results in the generation of the received bit stream.

Fig. 3
figure 3

System receiver design. Proposed modifications to the OFDM pipeline are shown in red stripes

3 System and Threat Models

Alice encrypts the payload portion of the OFDM signal after the IFFT operation at the transmitter but prior to cyclic prefix insertion, as shown in Fig. 2. The module implementing the security operation embeds the frequency shifts \(\overrightarrow {\psi }\), shown in Fig. 4, to the time-domain payload samples. Extraction of \(\overrightarrow {\psi }\) from the key and the mean CFO is discussed in detail in Section 5.1. The encryption technique is described in further detail in Section 5.2. The encrypted signal received by user j from user i is expressed as

$$ y_{j}^{\overrightarrow{\psi}}(n) = h_{i,j}(n) \ast x_{i}^{\overrightarrow{\psi}}(n)e^{\frac{j2\pi \nu_{i,j} n}{N}} + z(n), $$
(1)

where hi,j(n) is the channel impulse response between the users, \(x_{i}^{\overrightarrow {\psi }}(n)\) is the encrypted OFDM signal from user i, νi,j is the CFO relative to the sub-carrier spacing observed by user j, N is the number of sub-channels, and z(n) is a noise component. Channel effects and CFO are experienced by the entire OFDM signal, while the encryption technique is only applied to the payload portion.

Fig. 4
figure 4

Key generation and mapping to frequency shifts. The focus of this work is on the shift mapping technique. Keys generated applying different methods are compatible

Bob and Eve utilize the receiver structure shown in Fig. 3, with the standard components in blue and the proposed blocks in red stripes. Decryption is performed by modifying the existing synchronization module to compensate for the induced frequency offsets according to the key-extracted shifts. Alice and Bob possess matching keys that are unique to the key used by Eve.

Finally, the following assumptions are made regarding the eavesdropper Eve:

  • Eve knows the signal structure, reference signals, as well as the encryption and decryption algorithms used by Alice and Bob.

  • Eve is separated from both Alice and Bob by a distance of at least half of the signal wavelength. For example, at 2.4GHz this corresponds to 6.25 cm.

  • Eve does not interfere with the communication between Alice and Bob or manipulate the physical environment.

4 Key Generation and Management Policy

The proposed encryption method begins with Alice and Bob agreeing on a common key, with the proviso that Eve always obtains a different key, even knowing fully well the agreement algorithm implemented by Alice and Bob. The focus of this work is on the development and implementation of an encryption technique once the key is established; however, a summary of a method to generate keys is provided here for completeness.

Key generation relies on physical layer properties inherent to wireless OFDM communication and utilizes an algorithm previously developed in Jacovic et al. [7]. Alice and Bob exchange packets during a probing period, extract channel estimates and CFO measurements, reconcile the PHY layer features with each other, and create unique and reciprocal secret keys. The mean CFO value is calculated using packet statistics at a higher layer of the protocol stack; therefore, the calculated statistics are not considered a PHY layer operation. The randomness of the wireless channel is used to extract bits at threshold crossings of the channel estimate magnitudes for each user, while the mean CFO value is taken at different quantization levels. Alice and Bob exchange time indices of the channel estimate threshold crossings and distances from the quantization boundaries of the CFO. Bits corresponding to matching time indices are retained, while the remaining are discarded. The quantized CFO is selected such that the sum of the boundary distances measured by Alice and Bob is the largest. The exchange allows both Alice and Bob to reconcile the extracted bit sequences and CFO estimates. The outputted key for each user is generated by performing an XOR operation of the extracted bit sequence with bits produced by a pseudorandom number generator (PRNG), where the CFO value is used as a seed. The length of the generated key is 256 bits. Eve observes packet exchanges between Alice and Bob during the reconciliation stage and develops her own key using the same agreement algorithm. The channel properties and CFO between radio pairs are reciprocal; however, do not match exactly due to RF impairments and measurement error. The estimated channels between Alice and Bob exhibit correlation with each other if the sampling time is less than the coherence time of the channel. However, Eve’s channel differs from the one between Alice and Bob as she is at a distance greater than half of the signal wavelength, as described in Section 3. The channel estimates that form the basis for her generated key differ, which results in a different extracted bit sequence for Eve.

The method to generate the key is secure based on the assumptions made in Section 3 and the properties of wireless channels. Fading is an inherent characteristic of wireless communication systems, which occurs due to multi-path propagation of signals and obstructions in the environment. The fading channels experienced by distinct receivers from a single source are statistically independent if the receiver antennas are separated by a distance corresponding to at least half of the signal wavelength [4, 8, 9]. In addition, Eve is assumed to not interfere with the probing process or change the physical surroundings between Alice and Bob. The constraints prevent Eve from creating a deterministic channel between the legitimate nodes. The keys generated by Alice and Bob are guaranteed to be secure from Eve due to the given assumptions. Channel estimate based key generation for security has been validated experimentally under various environments in the past [10, 11].

Once a key bit is generated, the bit is stored in a shift register that is updated periodically with new channel estimate and CFO information by applying the management protocol previously developed by Chacko et al. [12]. Periodically, contents of the shift register are transferred to a register holding the key bits used during the given transmit period, where the period is based on the number of packets transmitted or a fixed time interval. In addition, the frequency mapping algorithm requires a pointer to an 8 bit sub-key taken from the set of key bits stored in the key register. The pointer offset is based on a counter that is advanced contingent upon the shift frequency of the sub-key, as discussed in Section 5.1. Another method to extend the duration of the key is to utilize the stored value from the key register as an initial seed to a PRNG. The output sequence is then used as the extracted sub-key for the mapping algorithm.

5 Encryption at Transmitter

The encryption scheme at the transmitter is described in this section, with corresponding details of the implementation provided.

5.1 Frequency Shift Mapping

The frequency mapper shown in Fig. 5 takes as input the average CFO value, represented in IEEE 754 single-precision floating-point format [13], and alters selected bits of the CFO value using XOR translation with an 8-bit sub-key. The three least significant bits of the exponent field are each XORed with a key bit, as well as the five most significant bits of the fraction. The eight specific bits are chosen based on the influence each has on the translated CFO value, with further analysis provided in Section 7. As the fifth most significant fractional bit is used, the minimum possible offset is 1/32. An increase in the minimum offset is possible by applying more bits of the exponent rather than the fraction. The maximum offset occurs when the key is the inverse of the original 8-bit component of the average CFO value. For the 8-bits chosen for the mapping, the maximum offset is 7.96875 when including the second least significant bit to the first most significant bit of the fractionFootnote 1.

Fig. 5
figure 5

Frequency mapping technique that uses the average CFO value stored in a register and translates a subset of the bits via XOR operations. Data is stored as a 32-bit floating-point value as per the IEEE 754 format [13]

Recall that the key bits are generated via the PHY layer approach described in Section 4, and only an 8-bit portion of the key is used for the current data transmission. Updates of the sub-key are possible on a packet basis, or on a more frequent update of the fine-grained symbols. As the XOR cipher used for the security technique is vulnerable to attack due to multiple transmissions, the frequency of the update of the sub-key is important to allow for one-time pad security. Note that the adversary is assumed not able to insert a known message into the transmitter, which implies known-plaintext attacks are avoided. However, the frequent update of the sub-key and key register make a known-plaintext attack difficult to execute.

In addition, an attacker is unable to determine the frequency shifts and decode the encrypted signal through an exhaustive search. The 8-bit sub-key is used to modify the mean CFO value and produce a single frequency shift. The mean CFO observed from a window of samples changes over time, and the length of the secret key is much larger than the sub-key to facilitate multiple frequency shifts per packet.

The FPGA implementation of the proposed encryption technique consists of a frequency shift mapper and a sequence buffer to align the frequency shifts \(\overrightarrow {\psi }\) with samples of the in-phase and quadrature phase components. The inputs consist of the key, the reconciled mean CFO value, and sequence duration parameters, while the output is \(\overrightarrow {\psi }\). The shift mapper requires the Boolean key bitstream, the reconciled mean CFO value in 32-bit floating-point format, and a corresponding “key valid” signal. The enable signal is delayed to align with the output. Buffering of the resulting signals requires additional inputs of the Boolean enable signal corresponding to the payload samples and the sequence duration parameters. A Boolean constant is provided to select the duration of each element of \(\overrightarrow {\psi }\) to either match the desired shift granularity or to use a single shift for the entire payload. Both lengths are provided as constant values and are configurable. A single port RAM is used to write and read the values of \(\overrightarrow {\psi }\). The shift duration and enable signals are utilized with three 12-bit free running counters to control the operation of the RAM and provide the properly repeated and aligned shift sequence. The output of the shift mapping is a 32-bit signal \(\overrightarrow {\psi }\). The payload and enable signals are delayed to align with the output.

5.2 Method of Encryption

An overview of the encryption technique implemented at the transmitter is shown in Fig. 6. The technique was implemented in the time-domain due to limitations of applying the shifts in the frequency domain. For example, integer frequency induction requires minimal complexity to implement as the operation is simply a circular shift in the frequency domain. However, the method suffers from (i) a lower possible number of shifts and (ii) the ability of an eavesdropper to determine the shifts through frequency domain cross-correlation. In addition, fractional frequency induction in the frequency domain requires upsampling, a larger FFT, scaling of the output, and complex control signals. The use of a smaller FFT is possible, but requires multiple stages that increase latency and the multiplication by complex exponentials, which defeats the purpose of operating in the frequency domain. Shift values in the frequency domain are a quantized equivalent of that achieved in the time-domain. Operating in the time-domain also permits the application of streamlined shift values. The time-domain samples u[n], after the IFFT operation, are shifted in frequency according to

$$ {w}[n] = u[n]\exp\left( \frac{j2\pi{\psi_{n}}{n}}{N}\right), $$
(2)

where n is the time index, ψn is the normalized frequency shift as described in Section 5.1 at n, and N is the number of sub-channels. The real and imaginary signal components from calculation of (2) are separated as follows. The encrypted signal prior to the cyclic prefix insertion is represented as

$$ {w}[n] = {w}^{I}[n] + j{w}^{Q}[n], $$
(3)

where the superscripts {⋅}I and {⋅}Q represent the in-phase and quadrature components of a signal, respectively. After applying Euler’s formula, the real component of the encrypted signal is given as

$$ {w}^{I}[n] = u^{I}[n]\cos\left( \frac{2\pi \psi_{n}{n}}{N}\right) - u^{Q}[n]\sin\left( \frac{2\pi \psi_{n}{n}}{N}\right), $$
(4)

and the quadrature phase component as

$$ {w}^{Q}[n] = u^{I}[n]\sin\left( \frac{2\pi \psi_{n}{n}}{N}\right) + u^{Q}[n]\cos\left( \frac{2\pi \psi_{n}{n}}{N}\right). $$
(5)
Fig. 6
figure 6

PHY layer encryption technique at transmitter. The proposed method is shown in red stripes

The implementation consists of an instance of the shift mapper from Section 5.1 and a time-domain frequency shifter with an operating response described by (2). The frequency shifter requires \(\overrightarrow \psi \) from the mapper, the real and imaginary components of the payload samples with data type S16_14, which indicates a signed 16-bit signal with a binary point of 14, and the corresponding Boolean payload valid signal. The exponent is calculated using a constant multiplier and a 32-bit counter. A COordinate Rotation DIgital Computer (CORDIC) module is used to implement the sin and cos components of (4) and (5). The input argument to the CORDIC requires a modulo-2π operation and a mapping to ± π due to module constraints, which are performed using relational operators and bit slices. Four multipliers and two adders are required to implement the complex operations of w[n] given by (3). The resulting real and imaginary components of the payload are of the same data type as the input and are sequentially aligned with the corresponding valid out signal.

6 Decryption at Receiver

The decryption method at the receiver is described in this section with corresponding details of the implementation provided. The frequency shift mapping implemented for the encryption method discussed in Section 5 is needed at the receiver as well. The design of the baseline synchronizer is first described to provide context for the modifications required to implement the proposed decryption methodology.

6.1 OFDM Synchronizer

A joint time and frequency OFDM synchronizer for the IEEE 802.11g physical layer was developed based on techniques described in [14] and [15]. The frequency acquisition range, normalized to the sub-carrier spacing, was limited to the fractional CFO, which is a practical choice for an indoor Wi-Fi setting. The signal bandwidth is 20 MHz with 64 sub-channels, resulting in a sub-carrier spacing of 312.5 kHz. The maximum error in frequency per local oscillator is 25 parts per million (ppm), which results in a maximum possible offset of ± 120 kHz at a carrier frequency of 2.4 GHz [16]. Based on the Doppler shift of a signal given by

$$ f_{d} = \frac{v}{\lambda}, $$
(6)

where v is the velocity in meters per second and λ is the wavelength of the signal, a velocity of 24.1 km/s is required for integer CFO to occur.

The stages of the synchronizer are shown in Fig. 7, in which the received signal is subject to coarse timing acquisition, fractional CFO estimation, CFO correction, and finally fine timing acquisition. The execution of coarse timing and CFO estimation are primarily based on the contributions described in [14], in which a modified correlation is applied to leverage a repetitive preamble structure. An iterative representation of the modified correlation is given as

$$ \begin{array}{@{}rcl@{}} P(0) &=& 0, \\ P[n+1] &=& P[n]+r^{*}[n+L]r[n+2L]-r^{*}[n]r[n+L], \end{array} $$
(7)

where n denotes the time index, r the received signal at a given time n, and L the lag set to the number of sub-carriers N. A detailed description of the implementation of the coarse timing acquisition is provided in Appendix A. The fractional CFO is calculated by analyzing the phase of the modified correlation given by (7) at the estimated coarse timing point tcoarse as

$$ \hat{\nu} = \frac{\angle{P(t_{coarse})}}{2\pi}. $$
(8)

The estimation algorithm described in [14] consists of both fractional and integer components, which results in the merging of the two estimates. For example, if the true CFO of a signal is 3.7 sub-carrier spacings, the fractional estimate is − 0.3 with integer 4 since the search space is limited to even sub-carriers. In the case that no integer CFO estimate is calculated, the fractional estimate is either − 0.3 or 0.7. The actual CFO is determined as an element of

$$ \overrightarrow{V} = \{\hat{\nu},-sign(\hat{\nu})(1-|\hat{\nu}|)\}, $$
(9)

due to the integer estimation component of the algorithm. Two copies of the received signal are fractionally corrected, and then a cross-correlator bank is applied to compensate for the difference in the algorithm, where only the fractional component is considered. The corrected unencrypted signal is given as

$$ \hat{x}_{i}[n] = y[n]\exp\left( \frac{-j2\pi{V_{i}}{n}}{N}\right), $$
(10)

where the subscript i denotes the unique CFO estimate, y[n] is the unencrypted received signal, and n the time index. Similar to Section 5.2, the real component of the corrected signal is given as

$$ \hat{x}_{i}^{I}[n] = y^{I}[n]\cos\left( \frac{-2\pi V_{i}{n}}{N}\right) - {y_{i}^{Q}}[n]\sin\left( \frac{-2\pi V_{i}{n}}{N}\right), $$
(11)

and the quadrature phase component as

$$ \hat{x}_{i}^{Q}[n] = y^{I}[n]\sin\left( \frac{-2\pi V_{i}{n}}{N}\right) + y^{Q}[n]\cos\left( \frac{-2\pi V_{i}{n}}{N}\right). $$
(12)

Substituting (11) and (12) into (10), the original unencrypted corrected signal is given as

$$ \hat{x}_{i}[n] = \hat{x}_{i}^{I}[n] + j\hat{x}_{i}^{Q}[n]. $$
(13)

Fine timing and determination of the correct CFO estimate are performed using cross-correlation of the corrected signals with the known reference signal. Threshold crossings are used to align the signals, and the maximum values of the correlation are compared to determine the CFO from the array of possible CFO values \(\overrightarrow {V}\). A detailed description of the fine timing component of the synchronizer is provided in Appendix A

Fig. 7
figure 7

Block diagram of the stages of the synchronizer

The inputs to the OFDM synchronizer block are the real and imaginary samples of the signal each with data type S16_14 (signed 16-bit signal with binary point 14) and the timing comparison thresholds with data type U16_0 (unsigned 16-bit signal with binary point 0). The thresholds are used as addresses to the Block RAMs, which allows for the setting of fractional values. The modified correlation of P(d) with data type S32_23 is utilized at the coarse timing point to estimate the CFO given by (9) using a CORDIC module that is executed 5 times. Estimates are set to S16_14 since only the fractional CFOs are considered. The input to the CORDIC used for CFO correction also requires the modulo-2π operator and a mapping to ± π as described in Section 5.2. Calculations of (11) and (12) are performed in parallel for both CFO estimates. A total of three CORDIC modules are required in the design of the unmodified synchronizer: one for estimation and two for correction. The corrected signals are of data type S16_14 and are inputs to the implemented cross-correlation function described in A. The outputs of the overall synchronization system are the in-phase and quadrature phase frequency corrected samples with data type S16_14 and the corresponding timing pulses of data type U1_0 from the correlator for packet alignment.

6.2 Method of Decryption

When decrypting the payload portion of the packet, the frequency shifts are removed. The existing synchronizer is modified to enable the decryption operation. The details on the design and implementation of the decryption technique are described in this Section.

An overview of the decryption technique at the receiver is shown in Fig. 8. The existing frequency correction module is leveraged to minimize system complexity, with the primary modification being the shift applied to the payload samples. The real component of the decrypted signal is given as

$$ \hat{u}_{i}^{I}[n] = y^{I}[n]\cos\left( \frac{-2\pi (\zeta_{n}+V_{i}) {n}}{N}\right) - y^{Q}[n]\sin\left( \frac{-2\pi (\zeta_{n}+V_{i}) {n}}{N}\right), $$
(14)

where ζn is defined as

$$ \left\{\begin{array}{ll} 0 & n \leq L_{p} \\ \psi_{n} & n > L_{p} \end{array} \right. $$

The normalized frequency shift ψn is described in Section 5.1 at time index n, where Lp is the length of the preamble. Similarly, the quadrature phase component is given by

$$ \hat{u}_{i}^{Q}[n] = y^{I}[n]\sin\left( \frac{-2\pi (\zeta_{n}+V_{i}) {n}}{N}\right) + y^{Q}[n]\cos\left( \frac{-2\pi (\zeta_{n}+V_{i}) {n}}{N}\right), $$
(15)

which results in the decrypted signal of

$$ \hat{u}_{i}[n] = \hat{u}_{i}^{I}[n] + j\hat{u}_{i}^{Q}[n]. $$
(16)
Fig. 8
figure 8

Decryption modules at the receiver. The possible CFO values from (9) are estimated as \(\hat {{\nu }_1}\) and \(\hat {{\nu }_2}\). The proposed modifications are shown in red stripes

An instance of the shift mapper from Section 5.1 is used to calculate \(\overrightarrow {\psi }\). A payload valid signal from the coarse timing module is utilized to apply the additional security-based frequency shift to only the payload portion of the packet. The modified synchronizer of the receiver outputs the updated normalized frequency shifts with data type S32_23 to the CFO correction module, which compensates for the inherent CFO of the packet and decrypts the payload.

7 Performance Evaluation

The PHY layer encryption technique is evaluated via both simulation and hardware assessment for the following scenarios: (i) the effect of frequency shifting on an eavesdropper without knowledge of the proposed decryption methods; (ii) the end-to-end performance of an intended and eavesdropping receiver applying the proposed security method with keys generated and managed as described in Section 4, and (iii) the performance of the System Generator models with the same scenario as described by (ii). The resource utilization, the timing, and the power requirements of the various implementations are also provided.

7.1 Effect of Frequency Shifting

A simulation was performed to analyze the effect of frequency shifting on system performance, independent of the key and mapping techniques applied. The system model described in Section 3 was considered with Alice performing as a transmitter, and Bob and Eve-Blind as receivers. Alice applied frequency shifts on a per-symbol basis to the payload portion of the packet. Bob is aware of the applied shifts and compensates for them, while Eve-Blind, in this scenario, has knowledge of the signal characteristics as well as the reference signals.

The threat model represented by Eve-Blind differs from that described in Section 3 and represented by Eve in that the decryption algorithm is unknown to Eve-Blind. A characterization of the effect of frequency shifting on the performance of an OFDM receiver is provided in this section. The analysis performed in Sections 7.2 and 7.3 considers Eve as the threat model.

The OFDM signals utilized 64 sub-carriers N, a cyclic prefix length C of 16, guard band G of 11 sub-carriers, 4 pilot tones per symbol, 31 OFDM symbols per packet, Quadrature Phase Shift Keying (QPSK) single-carrier modulation, a carrier frequency fc of 2.4GHz, and a signal bandwidth of 10MHz. Channel equalization based on Minimum Mean Square Error (MMSE) is applied at each receiver with an ideal noise estimate. A summary of the OFDM parameters used by Alice, Bob, and Eve-Blind is provided in Table 1. Frequency shifts were randomly selected according to a uniform distribution bounded by a maximum shift of ψmax. The received signals were assumed to experience additive white Gaussian noise (AWGN) with a varying energy per bit to noise power spectral density ratio (Eb/N0). CFO was applied to the signals according to a uniform distribution bounded by the signal parameters and a maximum local oscillator offset of 20ppm. The bit error rate (BER) for Bob and Eve-Blind was calculated under repeated trials. The ψmax parameter was swept from 0.5 to 5 sub-carrier spacings as shown in Fig. 9. Bob’s BER is superior to Eve-Blind in all cases as expected, while Eve-Blind’s BER increases with ψmax. The effect of ψmax on the BER for Eb/N0 values of 5 and 10dB is characterized, with results as shown in Fig. 10. Based on the results, selecting a ψmax greater than or equal to 2 produces the theoretical worst BER of 0.5 for Eve-Blind. The effect of the number of shifts per OFDM symbol is characterized with results as shown in Fig. 11. A comparison between 1, 2, and 4 shifts per OFDM symbol are shown for ψmax values of 0.25 and 0.5. A BER of 0.5 was observed for Eve-Blind with 4 shifts per symbol, which indicates that even for small frequency shifts in the symbols the desired effect on the BER is achieved by increasing the number of total shifts per symbol.

Table 1 Parameters of the OFDM signal utilized in the study
Fig. 9
figure 9

BER performance of Eve-Blind as a function of the parameters ψmax and Eb/N0

Fig. 10
figure 10

BER performance of Eve-Blind when varying ψmax. The BER is characterized for Eb/N0 ratios of 5 dB and 10 dB

Fig. 11
figure 11

BER performance as a function of the number of shifts per OFDM symbol

7.2 Security Performance

The simulation framework from Section 7.1 is extended to include the developed key mapping based encryption and decryption techniques described in Section 5 and Section 6, respectively. The keys generated for Alice, Bob, and Eve were obtained by implementing the technique described in [7], as discussed in Section 4. The channel estimates and CFO were experimentally measured with Ettus USRP N210 radios using the software defined radio network testbed described in [17]. The threat model described in Section 3 is assumed, in which Eve has full knowledge of system parameters and applies the identical decryption technique as Bob. Shifts were updated at a per OFDM symbol basis, with ψmax set to 7.96875 sub-carrier spacings based on the frequency shift mapping described in Section 5.1.

A comparison between the BER of Bob, Eve, and Eve-Blind, in which Eve-Blind does not utilize the decryption technique, is shown in Fig. 12. The performance of Bob is not impacted by the implementation of the proposed security technique, while both Eve and Eve-Blind suffer a BER of 0.5 for all values of Eb/N0. Despite Eve knowing the applied reference signals, packet structure, and decryption algorithm, she is unable to recover the message due to the difference in the measured mean CFO, which results in an incorrect extracted key. Eve uses the identical algorithms to generate the keys as Alice and Bob. However, although Eve implements the decryption method applied by Bob, the differences in key value and mean CFO result in deviations in the calculated frequency shifts from the values used by Alice during encryption. The mean CFO is measured over an interval of received packets and is not constant over time. Therefore, determining the base CFO utilized in Section 5.1 is an additional challenge Eve faces. Instead of removing the frequency offsets, Eve further corrupts the received signal by applying an incorrect series of shifts. Eve-Blind in contrast does not have knowledge of or apply the decryption method and, therefore, processes the received signal under normal operation. The identically high BER shown for Eve and Eve-Blind demonstrates that the developed encryption technique provides a suitable method to secure communication links.

Fig. 12
figure 12

BER performance when applying the key mapping algorithm that utilizes experimentally collected keys

7.3 Analysis of the Hardware Implementation

The performance of the transceiver system implementing the proposed hardware encryption and decryption modules is verified using a combination of MATLAB scripts and the System Generator (sysgen) simulation environment. Signal parameters listed in Table 1 were selected with the exception of using Least Squares channel estimation instead of MMSE. The keys and measured CFO values for Bob and Eve were the same as those used in the performance study described in Section 7.2, and frequency shifts were also updated at each OFDM symbol with ψmax set to 7.96875. OFDM payload samples were generated in script and provided as inputs to the encryption module in the sysgen environment. The model uses the key, CFO value, and signals described in Section 5.2 to apply the security technique based on frequency shifting to the payload samples.

Execution of the script results in the insertion of the cyclic prefix to the output signal of the sysgen model, which occurs prior to parallel to serial conversion and appending of the preamble. AWGN and CFO effects were added to the transmit signal prior to being provided as input signals to the receiver. Two modified synchronization sysgen modules were implemented, each consisting of the synchronizer from Section 6.1 and the decryption block described in Section 6.2. The module instances represent Bob and Eve, with each providing their corresponding key and CFO measurements as system inputs. Each sysgen module performs coarse timing, CFO estimation, CFO correction, and decryption according to the given generated key. The cross-correlation function of the synchronizers was bypassed, and perfect timing synchronization was used in the script to isolate the effects of the encryption technique for characterization. The remaining receiver components shown in Fig. 3 were implemented in the script to extract the OFDM payload. Error vector magnitude (EVM) was calculated for Bob and Eve by comparing the corrected received QPSK symbols to the original symbols transmitted by Alice. In addition, the case of no implemented security features is considered as the benchmark configuration with results as shown in Fig. 13. The results from the hardware demonstration indicate that Bob is able to decrypt the signal without any performance degradation as compared to the case that features no added security, while Eve is unable to recover the message despite having full knowledge of the signal parameters and execution of the same decryption algorithm.

Fig. 13
figure 13

Comparison of the error-vector magnitudes achieved using the sysgen environment for Bob, Eve, and no security

The hardware is implemented such that the number of components required is minimized as FPGA resources are limited, while also assuming that resource efficient modules are more readily integrated within larger circuit topologies. The encryption module, baseline synchronizer, and decryption-modified synchronizer are synthesized on a Xilinx Virtex-7 FPGA VC707 Evaluation board to characterize the additional resources utilized for each component. The Xilinx Virtex-7 series is a high-end FPGA option suitable for both Wi-Fi and cellular prototyping, and acts as a gateway to a heterogeneous IoT sensor network as discussed in [18]. The proposed techniques can also be implemented on lower-end FPGA boards such as the Xilinx Artix-7. The primary limiting resource on the FPGA boards is the number of available multipliers; while the proposed encryption/decryption technique utilizes substantially less than the 740 multipliers available on the Artix-7 AC701 evaluation board.

Much of the complexity of the security technique is in the implementation of the transmitter. The resources required for the encryption module discussed in Section 5.2 are summarized in Table 2. Look-up Tables (LUTs) and Flip-flops (FFs) consume 1.65% and 0.8% of the total FPGA resources, respectively. Four Block Random Access Memory (BRAM) units are implemented to buffer the shift sequences, and ten multipliers are used to apply the modulo-2π scaling and to implement the complex function given by (3). The BRAM and multipliers occupy about 0.4% of the resources of the evaluation board. The FPGA resources required to implement the baseline synchronizer, which consists of the coarse timing unit, CFO estimation unit, CFO correction unit, and cross-correlation modules as described in Section 6.1, are listed in Table 3. The synchronizer consists of a greater number of circuit blocks since it is a more complex component. The results provide a benchmark to compare against after implementing the decryption module. The unit count and the percentage increase in the utilization of each resource (LUTs, FFs, BRAMs, and Mult/DSP48) as compared to the baseline synchronizer module are listed in Table 4. The number of LUTs and FFs is significantly less than that required by the encryption module, whereas the number of BRAMs remains the same as when an identical mapping module is used. Most notably, there is no increase in the number of multipliers since the decryption module reuses components of the synchronizer. As the encryption module is the primary source of added complexity, a Xilinx Artix-7 AC701 FPGA board was utilized to implement the module. The resource utilization report of the encryption module is listed in Table 5, where the resource count and the increase in the percent utilization over the baseline transmitter are provided.

Table 2 Estimated resource utilization of the encryption module to be integrated into the transmitter. The module is implemented on the Xilinx Virtex-7 FPGA VC707 Board
Table 3 Estimated resource utilization of the unmodified synchronizer implemented on the Xilinx Virtex-7 FPGA VC707 Board
Table 4 Overhead incurred by the synchronizer as a result of implementing the frequency shifting based decryption technique as compared with the baseline
Table 5 Estimated resource utilization of the encryption module to be integrated into the transmitter. The module is implemented on the Xilinx Artix-7 AC701 FPGA Board

The timing and power requirements of the encryption and decryption modules were analyzed through implementation on a Xilinx Artix-7 AC701 FPGA board. A 100MHz system clock was set to match the Ettus USRP N210 SDR[19]. The power and timing requirements are summarized in Table 6. The encryption module results in a 0.39 µs timing overhead attributed to the CORDIC and multiplication operations described in Section 5.2. A total on-chip power of 142mW was consumed by the encryption module, which consists of 22mW of dynamic and 120mW of static power. A baseline model that consists of delaying input signals by one clock cycle was considered to determine the power consumption attributed to the selected FPGA board. The simple module also consumed a static power of 120mW. As a result, only the dynamic power was determined to contribute to the total power consumption from the proposed security modules. Therefore, the power consumption attributed to the encryption technique is 22mW. The overhead in power is primarily a result of the resources utilized to implement the BRAM and CORDIC. The decryption module does not result in a timing overhead, and requires 11mW of dynamic power for the FPGA resources utilized to implement the BRAM.

Table 6 Estimated timing and power requirements of the encryption and decryption modules implemented on the Xilinx Artix-7 AC701 FPGA Board.

IoT communication consists predominately of Low Power Wide Area Network (LPWAN) protocols, including OFDM-based cellular systems, and short range networks related to ZigBee [20]. OFDM-based short range IoT that leverage Wi-Fi systems have been developed to provide increased data rates, support non-line-of-sight communication, and enhance area coverage [21]. Wi-Fi systems require frame reception and response transmission to occur within the time duration defined by the Short Interframe Space (SIFS) criterion of the IEEE 802.11 standard [22]. The 0.39 µs timing overhead listed in Table 6 for encryption accounts for only 3.9% of the 10 µs SIFS described by IEEE 802.11n, and does not hinder the ability of the communication protocol to meet standard requirements. An empirical characterization of the power consumption of an IEEE 802.11n network adapter was performed for different configurations of the transmitter and the receiver in [23]. The single input multiple output (SIMO) transmitter was determined to use 1.28W of power when active, while the single input single output (SISO) receiver consumed 0.94W when active. Based on the results listed in Table 6, the encryption technique results in a 1.72% increase in power consumption relative to IEEE 802.11n, while decryption results in an increase of 1.17%. The power consumption of both the SIMO transmitter and SISO receiver is analyzed for active communication. Wi-Fi data is typically sent in bursts, which allows for long periods of inactivity to conserve power. As the encryption and decryption blocks do not contribute to the static power consumption, the increase in the overall power consumption for both modules is acceptable.

The low overhead in FPGA resource utilization, timing, and power requirements as shown by the results listed in Tables 5 and 6 indicate that the proposed encryption techniques are applicable to low-power wireless systems. More importantly, the benefit of applying the security technique outweighs the additional requirements of both the transmitter and receiver.

8 Related Work

Securing signals for an authenticated receiver by making the transmitted signals indiscernable to an attacker is an essential area of focus for wireless communication systems, particularly for low-cost devices. A variety of related work on PHY layer security has been previously reported as existing radio components are leveraged to provide an additional layer of security. Time-domain scrambling was proposed in [24], which is performed after the Inverse Fast Fourier Transform (IFFT) and before cyclic prefix insertion in the OFDM pipeline. While additional security was provided, a complex transformation of the frequency domain constellation is required at the receiver. In addition, the work relied on a pre-shared key to ensure encrypted operation between two parties sharing a communication channel. In contrast, the proposed technique is capable of using either pre-shared keys or keys generated based on PHY layer properties as described in Section 4. Phase rotation and induced noise were applied at the transmitter to secure communication signals in [25]. However, the transmission pilot tones were unaltered throughout operation of the transceiver, which leaves the pilot tones vulnerable to an attacker. In addition, noise induction is an energy inefficient technique and impedes system performance. Pilot symbol manipulation was implemented in [26] by shifting the phase of certain sub-carriers based on a measured amplitude or phase threshold. Through simulation, the amplitude based approach reduced the successful execution of an eavesdropping attack while maintaining an acceptable level of performance. Both methods require perfect channel knowledge and consider reference signals of the preamble without discussion of pilot tone manipulation from within the payload. An attacker synchronized to the victim transceiver is able to recover the signal using pilot tone based channel estimation techniques with interpolation methods. Additional approaches to manipulate pilot symbols based on channel characteristics were considered in [27]. A measured threshold for channel gain was applied to generate pilot symbols that represented whether a sub-carrier contained legitimate information or dummy data throughout the transmission of the signal. The method also assumed perfect channel knowledge at the transmitter, did not consider pilot tones within the payload of the signal, and required a large overhead in transmission bandwidth as an equal number of data bearing and dummy sub-carriers were used.

The interleaver stage of the OFDM pipeline was modified to secure communication channels by using keys to alter the permutation sequence in [12]. The modified pipeline was implementated on a Virtex-6 FPGA, which resulted in less than a 1% increase in the resources utilized and a minor loss in performance as compared with the standard IEEE 802.11a interleaver. Exclusive OR (XOR) based encryption was applied to the preamble portion of an OFDM packet to limit the cross-correlation timing capabilities of an eavesdropper in [28]. The technique does not protect the payload of a packet in the event that an adversary is capable of detecting the signal energy and synchronize in time by applying auto-correlation methods.

In this paper, the frequency synchronization requirements of an OFDM signal are leveraged instead of the timing requirements. The CFO has previously been explored for authentication. The CFO measured between devices was demonstrated as a suitable property for authentication of communication links in [29], while second-order statistics were used to distinguish Wi-Fi compliant devices in [30]. Authentication using CFO was shown feasible for highly mobile communication channels in [31]. CFO was induced on a per-frame basis to allow for blind authentication by a regulatory device in [32]. The blind receiver required the implementation of highly complex techniques, which are not feasible in most communication systems based on OFDM. In addition, the CFO induction was applied only on a per-frame basis, in contrast to the proposed PHY layer encryption system that permits greater granularity in frequency shifting. CFO was previously leveraged by combining measurements with channel estimates for the purpose of PHY layer key generation in [7]. The keys are used as inputs to the system described in this paper, as the objective is on securing a communication link after a key has been established. A PHY layer encryption technique and the corresponding hardware components are described that induce frequency offsets to the payload portion of a packet to secure signals for wireless communication.

9 Conclusion

The wide adoption of wireless devices and the vulnerabilities of WPA2 and WPA3 have motivated additional research in developing low-cost security solutions. A PHY layer encryption method is described for OFDM signals based on frequency induction that complements existing security techniques. Keys are used to map frequency shifts to the payload of a packet, with extensive details on each implemented system component provided. Simulation and hardware results demonstrate that the proposed encryption technique is capable of preventing an eavesdropper from recovering the original message, while maintaining the desired performance of an intended receiver. The implementation of the techniques on a Xilinx Virtex-7 FPGA VC707 board resulted in an increase of 1.65% in the number of LUTs, 0.8% in the number of FFs, and less than 0.4% in the number of BRAM and multipliers required at the transmitter. Implementation of the decryption technique at the receiver required minimal additional FPGA resources, with the utilized LUTs, FFs, BRAM, and multipliers each increasing by less than 0.4%.

The techniques were implemented on a low-power Xilinx Artix-7 AC701 FPGA Board to validate suitability for OFDM-based applications. An increase of 3.73% in the number of LUTs, 1.82% in the number of FFs, 1.10% in the number of BRAMs, and 1.35% in the number of multipliers is required at the transmitter. Both the encryption and decryption modules were analyzed for timing and power requirements, and were compared with IEEE 802.11n standard systems. The encryption method produces a delay corresponding to 3.9% of the SIFS constraint, while the decryption technique does not result in a timing overhead. The power consumption of the transmitter and receiver increases by 1.72% and 1.17%, respectively.

The increase in system requirements is a minor trade-off for the added security provided. The technique is, therefore, suitable for a wide range of applications that require wireless communication.